Simple Code Highlighter Security & Risk Analysis

wordpress.org/plugins/simple-code-highlighter

Simple Syntax Code Highlighter

400 active installs v2.0 PHP + WP 4.0+ Updated Nov 10, 2017
buttoncodecodigohighlightersyntax
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Code Highlighter Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Code Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of the "simple-code-highlighter" plugin v2.0 reveals an exceptionally clean codebase with no apparent attack vectors. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly reduces the plugin's exposure to external manipulation. Furthermore, the code exhibits strong security practices, with 100% of SQL queries utilizing prepared statements, all output being properly escaped, and no dangerous functions or file operations being detected. The presence of capability checks, even with a small number, indicates some consideration for user permissions.

The taint analysis shows no detected flows with unsanitized paths, further reinforcing the idea that malicious data is unlikely to propagate through the plugin's code. The vulnerability history is also a significant strength, with zero recorded CVEs across all severity levels. This suggests a well-maintained and secure plugin over its lifespan. While the lack of nonces and the small number of capability checks could theoretically be improved, especially if the plugin were to expand its features, the current state of the code presents a very low risk profile.

In conclusion, the "simple-code-highlighter" plugin v2.0 appears to be a highly secure and well-developed piece of software based on the provided static analysis and vulnerability history. Its minimal attack surface, robust coding practices, and lack of known vulnerabilities contribute to an excellent security posture. The only minor areas for potential future enhancement would be the implementation of nonce checks for any new entry points and a review of capability checks if new features are added.

Vulnerabilities
None known

Simple Code Highlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Simple Code Highlighter Release Timeline

v2.0Current
Code Analysis
Analyzed Mar 16, 2026

Simple Code Highlighter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Simple Code Highlighter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwp_enqueue_scriptssimple-syntax-highlighter.php:12
actionafter_setup_themesimple-syntax-highlighter.php:22
actionadmin_enqueue_scriptssimple-syntax-highlighter.php:27
actionadmin_headsimple-syntax-highlighter.php:35
filtermce_external_pluginssimple-syntax-highlighter.php:48
filtermce_buttonssimple-syntax-highlighter.php:49
Maintenance & Trust

Simple Code Highlighter Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedNov 10, 2017
PHP min version
Downloads21K

Community Trust

Rating94/100
Number of ratings7
Active installs400
Developer Profile

Simple Code Highlighter Developer Profile

kedinn

1 plugin · 400 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Code Highlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-code-highlighter/js/pretty.js/wp-content/plugins/simple-code-highlighter/estilo.css/wp-content/plugins/simple-code-highlighter/icono.css
Script Paths
/wp-content/plugins/simple-code-highlighter/simple-syntax-highlighter-plugin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Simple Code Highlighter