Website Content in Page or Post – Embed website content in posts and pages Security & Risk Analysis

wordpress.org/plugins/show-website-content-in-wordpress-page-or-post

Fetches the content of another webpage or URL to display inside the current post or page.

100 active installs v2025.12.03 PHP + WP 4.0.0+ Updated Dec 3, 2025
blockcontentpagepostshortcode
99
A · Safe
CVEs total1
Unpatched0
Last CVEJun 21, 2024
Download
Safety Verdict

Is Website Content in Page or Post – Embed website content in posts and pages Safe to Use in 2026?

Generally Safe

Score 99/100

Website Content in Page or Post – Embed website content in posts and pages has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jun 21, 2024Updated 4mo ago
Risk Assessment

The "show-website-content-in-wordpress-page-or-post" plugin v2025.12.03 exhibits a generally good security posture with several positive indicators. The static analysis reveals no identified dangerous functions, all SQL queries are properly prepared, and output is consistently escaped. Furthermore, there are no identified taint flows, indicating a low risk of data being mishandled. The plugin also has a relatively small attack surface, with all identified entry points (shortcodes) likely protected by WordPress's default authentication mechanisms.

However, there are areas of concern that temper this positive outlook. The plugin makes two external HTTP requests, which could potentially be exploited if the target endpoints are compromised or if the plugin doesn't properly validate the responses. Crucially, the plugin lacks any explicit capability checks or nonce checks on its entry points. While the absence of direct AJAX handlers or REST API routes without permission callbacks is a positive, relying solely on default WordPress protections for shortcodes can be insufficient, especially if the content being displayed or processed is user-controlled or sensitive. The plugin's vulnerability history, which includes one medium-severity Cross-Site Scripting (XSS) vulnerability reported in June 2024, despite being patched, highlights a past weakness in input sanitization or output encoding. This history, combined with the current absence of explicit capability and nonce checks, suggests a potential for future vulnerabilities if not addressed proactively.

In conclusion, while the plugin demonstrates sound practices in areas like SQL handling and output escaping, the lack of explicit security checks on its shortcode entry points and the presence of external HTTP requests warrant caution. The past XSS vulnerability reinforces the need for robust security measures. The plugin's strengths lie in its clean code regarding dangerous functions and prepared statements, but its weaknesses are in the potential for XSS or other injection attacks if user-supplied data is involved and not sufficiently validated at the shortcode level, and the risks associated with external requests. A balanced approach would involve strengthening the security of the shortcode processing and thoroughly vetting the external HTTP request handling.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
  • Two external HTTP requests
  • Past medium severity XSS vulnerability
Vulnerabilities
1

Website Content in Page or Post – Embed website content in posts and pages Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-2430medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Website Content in Page or Post <= 2024.03.27 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jun 21, 2024 Patched in 2024.04.09 (11d)
Code Analysis
Analyzed Mar 16, 2026

Website Content in Page or Post – Embed website content in posts and pages Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Website Content in Page or Post – Embed website content in posts and pages Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[horshipsrectors_get_html] show-website-content-in-wordpress-page-or-post.php:22
[horshipsrectors_get_html_get] show-website-content-in-wordpress-page-or-post.php:23
[horshipsrectors_get_html_curl] show-website-content-in-wordpress-page-or-post.php:24
WordPress Hooks 1
actionelementor/widgets/widgets_registeredshow-website-content-in-wordpress-page-or-post.php:26
Maintenance & Trust

Website Content in Page or Post – Embed website content in posts and pages Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version
Downloads12K

Community Trust

Rating60/100
Number of ratings5
Active installs100
Developer Profile

Website Content in Page or Post – Embed website content in posts and pages Developer Profile

Matteo Enna

14 plugins · 850 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Website Content in Page or Post – Embed website content in posts and pages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
horshipsrectors_get_htmlhorshipsrectors_get_html_gethorshipsrectors_get_html_curl
Shortcode Output
[horshipsrectors_get_html][horshipsrectors_get_html_get][horshipsrectors_get_html_curl]
FAQ

Frequently Asked Questions about Website Content in Page or Post – Embed website content in posts and pages