Solr for WordPress Security & Risk Analysis

wordpress.org/plugins/solr-for-wordpress

A WordPress plugin that replaces the default WordPress search with Solr.

10 active installs v0.5.1 PHP + WP 3.0+ Updated Dec 13, 2011
custom-searchsearchsearch-integrationsearch-resultssolr
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Solr for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Solr for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "solr-for-wordpress" plugin v0.5.1 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and boasts an attack surface that appears entirely protected by authentication checks. This suggests a responsible approach to handling common entry points like AJAX, REST API, shortcodes, and cron jobs.

However, the static analysis reveals significant areas of concern that detract from its overall security. The lack of any nonce or capability checks for entry points is a critical oversight, as it implies that even authenticated users might be able to trigger unintended actions. Furthermore, all SQL queries are executed without prepared statements, creating a high risk of SQL injection vulnerabilities, especially given the presence of file operations and external HTTP requests that could potentially be influenced by user input.

The taint analysis, while limited in scope with only two flows analyzed, found one with an unsanitized path. Although not classified as critical or high severity, this indicates a potential for privilege escalation or unauthorized access if that path is exploited. The low percentage of properly escaped output (37%) further exacerbates these risks, as it increases the likelihood of cross-site scripting (XSS) vulnerabilities.

Key Concerns

  • All SQL queries use raw execution
  • No capability checks on entry points
  • No nonce checks on entry points
  • Low percentage of output escaping
  • Taint flow with unsanitized path
Vulnerabilities
None known

Solr for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Solr for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
0 prepared
Unescaped Output
57
34 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
6
Bundled Libraries
0

SQL Query Safety

0% prepared8 total queries

Output Escaping

37% escaped91 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<solr-for-wordpress> (solr-for-wordpress.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Solr for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
actionwp_headsolr-for-wordpress.php:1331
actiontemplate_redirectsolr-for-wordpress.php:1497
actionpublish_postsolr-for-wordpress.php:1498
actionpublish_pagesolr-for-wordpress.php:1499
actionsave_postsolr-for-wordpress.php:1500
actiondelete_postsolr-for-wordpress.php:1501
actionadmin_menusolr-for-wordpress.php:1502
actionadmin_initsolr-for-wordpress.php:1503
actionwidgets_initsolr-for-wordpress.php:1504
actionwp_headsolr-for-wordpress.php:1505
actionadmin_headsolr-for-wordpress.php:1506
actiondeactivate_blogsolr-for-wordpress.php:1509
actionactivate_blogsolr-for-wordpress.php:1510
actionarchive_blogsolr-for-wordpress.php:1511
actionunarchive_blogsolr-for-wordpress.php:1512
actionmake_spam_blogsolr-for-wordpress.php:1513
actionunspam_blogsolr-for-wordpress.php:1514
actiondelete_blogsolr-for-wordpress.php:1515
actionwpmu_new_blogsolr-for-wordpress.php:1516
Maintenance & Trust

Solr for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedDec 13, 2011
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Solr for WordPress Developer Profile

mattweber

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Solr for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/solr-for-wordpress/solr.js
Script Paths
/wp-content/plugins/solr-for-wordpress/solr.js
Version Parameters
solr-for-wordpress/solr.js?ver=

HTML / DOM Fingerprints

JS Globals
solr_options
FAQ

Frequently Asked Questions about Solr for WordPress