SmartAss Highlighter Security & Risk Analysis

wordpress.org/plugins/smartass-highlighter

SmartAss Highlighter is extremely simple and easy to use syntax highlighter for your code. Shortcode - [highlighter]

10 active installs v1.0 PHP + WP 2.7+ Updated May 9, 2015
code-highlighterhighlightersmartasswordpress-code-highlightwp-code
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SmartAss Highlighter Safe to Use in 2026?

Generally Safe

Score 85/100

SmartAss Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The smartass-highlighter v1.0 plugin exhibits a generally positive security posture, with no known vulnerabilities in its history and a clean taint analysis. The code signals indicate good practices regarding SQL queries, all of which are prepared statements. Furthermore, the absence of file operations and external HTTP requests reduces the potential for certain attack vectors.

However, there are significant concerns regarding output escaping. With 100% of its five identified output points lacking proper escaping, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Attackers could potentially inject malicious scripts through the plugin's output, which could then be executed in the context of a user's browser.

While the plugin has a clean vulnerability history and a limited attack surface, the complete lack of output escaping is a critical flaw that overshadows its strengths. A more robust security analysis would involve dynamic testing to confirm the absence of exploitable XSS, but based on static analysis alone, the unescaped output is the most pressing security concern.

Key Concerns

  • All output not properly escaped
Vulnerabilities
None known

SmartAss Highlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

SmartAss Highlighter Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

SmartAss Highlighter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

SmartAss Highlighter Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[highlighter] SmartAss-Highlighter.php:61
WordPress Hooks 7
actionadmin_menuSmartAss-Highlighter-admin.php:50
filterthe_contentSmartAss-Highlighter.php:39
actionwp_footerSmartAss-Highlighter.php:58
actionadmin_headSmartAss-Highlighter.php:97
filtermce_external_pluginsSmartAss-Highlighter.php:106
filtermce_buttons_3SmartAss-Highlighter.php:107
actioninitSmartAss-Highlighter.php:125
Maintenance & Trust

SmartAss Highlighter Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 9, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SmartAss Highlighter Developer Profile

th3pirat3

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SmartAss Highlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smartass-highlighter/highlighter.js/wp-content/plugins/smartass-highlighter/highlighter.css
Script Paths
/wp-content/plugins/smartass-highlighter/highlighter.js

HTML / DOM Fingerprints

CSS Classes
prettyprint
JS Globals
window.onloadprettyPrint()
Shortcode Output
[highlighter]
FAQ

Frequently Asked Questions about SmartAss Highlighter