
Sniplets Security & Risk Analysis
wordpress.org/plugins/snipletsSniplets is a generic text insertion plugin. Use it to manually or automatically insert data, PHP, syntax highlight, and almost anything else!
Is Sniplets Safe to Use in 2026?
Mostly Safe
Score 81/100Sniplets is generally safe to use though it hasn't been updated recently. 3 past CVEs were resolved.
The "sniplets" plugin v1.4.5 exhibits a mixed security posture. While the static analysis reports a seemingly small attack surface with no apparent direct entry points that lack authorization, significant concerns arise from the code signals. The presence of the `unserialize` function is a major red flag, as it can lead to remote code execution if used with untrusted input. Furthermore, the low percentage of SQL queries using prepared statements and the extremely low rate of properly escaped output suggest a high likelihood of SQL injection and cross-site scripting vulnerabilities, respectively.
The plugin's vulnerability history, with three known CVEs including critical ones for cross-site scripting, code injection, and remote file inclusion, strongly corroborates these code analysis concerns. The fact that the last vulnerability was in 2008 and none are currently unpatched is positive, but the historical pattern of severe vulnerabilities indicates a history of insecure coding practices. While the plugin's entry points are not directly exploitable in this version based on the provided static analysis, the internal code quality and historical vulnerabilities present a substantial risk if any of the identified weaknesses are exposed or if new vulnerabilities are introduced.
In conclusion, despite a lack of immediately obvious exploitable entry points in the current static analysis, the core codebase contains dangerous functions and exhibits poor security hygiene regarding SQL prepared statements and output escaping. The significant historical vulnerability record further amplifies the risk. Users should be extremely cautious and consider alternatives or ensure rigorous auditing and patching if they must use this plugin.
Key Concerns
- Dangerous function: unserialize used
- Low percentage of SQL prepared statements
- Low percentage of properly escaped output
- High number of past critical CVEs
- Flows with unsanitized paths found
- History of RFI, XSS, and Code Injection
Sniplets Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Sniplets < 1.2.3 - Cross-Site Scripting
Sniplets < 1.2.3 - Remote Code Execution
Sniplets < 1.2.3 - Remote File Inclusion
Sniplets Release Timeline
Sniplets Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Sniplets Attack Surface
WordPress Hooks 27
Maintenance & Trust
Sniplets Maintenance & Trust
Maintenance Signals
Community Trust
Sniplets Alternatives
Page In Page
page-in-page
This plugin helps you insert a post or page from the WP posts database table within another, bring your Facebook posts and Twitter feeds to your blog.
PHPEval
phpeval
The PHPEval Plugin is a Wordpress plugin which allows users to write php code inside of their pages. Embedded php code will be executed when the post …
Insert PHP Code Snippet
insert-php-code-snippet
Add PHP code to your pages and posts easily using shortcodes.
Display Posts – Easy lists, grids, navigation, and more
display-posts-shortcode
Add a listing of content on your website using a simple shortcode. Filter the results by category, author, and more.
Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts
insert-php
Insert PHP, JavaScript, CSS, HTML, ads, and tracking code into WordPress headers, footers, pages, and content using conditional logic, without editing …
Sniplets Developer Profile
14 plugins · 2.2M total installs
How We Detect Sniplets
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/sniplets/resource/admin.css/wp-content/plugins/sniplets/resource/admin.js/wp-content/plugins/sniplets/resource/admin.jssniplets/resource/admin.js?ver=sniplets/resource/admin.css?ver=HTML / DOM Fingerprints
data-sniplet-namedata-sniplet-iddata-sniplet-post-idSniplets[sniplet [sniplet]