Simple Divi Shortcode Security & Risk Analysis

wordpress.org/plugins/simple-divi-shortcode

Insert DIVI Library item inside module content or inside a php template by using a shortcode.

10K active installs v1.2 PHP 5.6+ WP 4.0+ Updated Jun 25, 2025
dividivi-librarydivi-moduleselegant-themesshortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Divi Shortcode Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Divi Shortcode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "simple-divi-shortcode" v1.2 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and having no recorded vulnerabilities (CVEs) or known issues. It also presents a very small attack surface with no AJAX handlers or REST API routes, and importantly, no direct entry points are left unprotected. The absence of file operations, external HTTP requests, and bundled libraries further reduces potential risks.

However, significant concerns arise from the output escaping. With three total outputs and 0% properly escaped, there is a high likelihood of cross-site scripting (XSS) vulnerabilities. The lack of nonce checks and capability checks, especially in the context of shortcodes (which can be triggered by any logged-in user), means that attackers could potentially inject malicious scripts that execute within the context of other users' sessions. The taint analysis showing no flows is not necessarily a strength, as it could indicate a lack of comprehensive taint analysis or a very simple code structure where such flows are unlikely to be detected by the tool.

In conclusion, while the plugin avoids common pitfalls like raw SQL and unpatched CVEs, the complete lack of output escaping on all its output points is a critical weakness that exposes users to XSS attacks. The absence of authentication and authorization checks on its single shortcode entry point amplifies this risk. The plugin's small attack surface is a mitigating factor, but the severity of the output escaping issue cannot be overstated.

Key Concerns

  • Unescaped output on all outputs
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Simple Divi Shortcode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Divi Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Simple Divi Shortcode Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[showmodule] simple_divi_shortcode.php:65
WordPress Hooks 6
actionload-post.phpsimple_divi_shortcode.php:25
actionload-post-new.phpsimple_divi_shortcode.php:26
actionadd_meta_boxessimple_divi_shortcode.php:29
filtermanage_et_pb_layout_posts_columnssimple_divi_shortcode.php:48
actionmanage_et_pb_layout_posts_custom_columnsimple_divi_shortcode.php:59
actionadmin_footersimple_divi_shortcode.php:110
Maintenance & Trust

Simple Divi Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 25, 2025
PHP min version5.6
Downloads67K

Community Trust

Rating100/100
Number of ratings22
Active installs10K
Developer Profile

Simple Divi Shortcode Developer Profile

Fabrice ESQUIROL

1 plugin · 10K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Divi Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
show-shortcode
JS Globals
jQuery
Shortcode Output
[showmodule id="
FAQ

Frequently Asked Questions about Simple Divi Shortcode