
Source View Security & Risk Analysis
wordpress.org/plugins/source-viewThis plugin outputs a source code of the function/class you specified.
Is Source View Safe to Use in 2026?
Generally Safe
Score 85/100Source View has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The source-view plugin version 1.1 demonstrates a generally good security posture based on the static analysis and vulnerability history provided. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate a strong adherence to security best practices, with all SQL queries using prepared statements and the presence of a capability check. The lack of dangerous functions, file operations, external HTTP requests, and nonce checks further contribute to a secure foundation.
While the static analysis shows no critical or high severity taint flows, and the vulnerability history is clean, there is a minor concern regarding output escaping. Approximately 22% of outputs are not properly escaped, which could potentially lead to cross-site scripting (XSS) vulnerabilities if malicious data were to reach these unescaped outputs. This is the primary area for improvement. The clean vulnerability history is a positive indicator, suggesting that the developers have been diligent in addressing any past security issues, or that the plugin's limited functionality has not presented common attack vectors. Overall, the plugin is well-secured, with the main area for attention being the incomplete output escaping.
In conclusion, source-view v1.1 exhibits strong security practices, particularly in its limited attack surface and safe handling of database operations. The lack of historical vulnerabilities is reassuring. However, the unescaped output represents a potential weakness that should be addressed to achieve a fully robust security profile. The plugin's strengths far outweigh its weaknesses, but neglecting the unescaped output could still expose users to risk.
Key Concerns
- Unescaped output detected
Source View Security Vulnerabilities
Source View Code Analysis
Output Escaping
Source View Attack Surface
WordPress Hooks 2
Maintenance & Trust
Source View Maintenance & Trust
Maintenance Signals
Community Trust
Source View Alternatives
Temporary Login Without Password
temporary-login-without-password
Create self-expiring, temporary admin accounts. Easily share direct login links (no need for username/password) with your developers or editors.
Heartbeat Control
heartbeat-control
Allows you to easily manage the frequency of the WordPress heartbeat API.
Elementor Beta (Developer Edition)
elementor-beta
Elementor Beta (Developer Edition) gives you direct access into Elementor's development process, and lets you take an active part in perfecting o …
SyntaxHighlighter Evolved
syntaxhighlighter
Easily post syntax-highlighted code to your site without having to modify the code at all. As seen on WordPress.com.
Automatic Domain Changer
automatic-domain-changer
Automatically detects a domain name change, and updates all the WordPress tables in the database to reflect this change.
Source View Developer Profile
11 plugins · 8K total installs
How We Detect Source View
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
brush: php;first-line:<pre class="brush: php; first-line: