Source View Security & Risk Analysis

wordpress.org/plugins/source-view

This plugin outputs a source code of the function/class you specified.

10 active installs v1.1 PHP + WP 3.3.2+ Updated Jul 30, 2019
developerreflectionsource
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Source View Safe to Use in 2026?

Generally Safe

Score 85/100

Source View has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The source-view plugin version 1.1 demonstrates a generally good security posture based on the static analysis and vulnerability history provided. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate a strong adherence to security best practices, with all SQL queries using prepared statements and the presence of a capability check. The lack of dangerous functions, file operations, external HTTP requests, and nonce checks further contribute to a secure foundation.

While the static analysis shows no critical or high severity taint flows, and the vulnerability history is clean, there is a minor concern regarding output escaping. Approximately 22% of outputs are not properly escaped, which could potentially lead to cross-site scripting (XSS) vulnerabilities if malicious data were to reach these unescaped outputs. This is the primary area for improvement. The clean vulnerability history is a positive indicator, suggesting that the developers have been diligent in addressing any past security issues, or that the plugin's limited functionality has not presented common attack vectors. Overall, the plugin is well-secured, with the main area for attention being the incomplete output escaping.

In conclusion, source-view v1.1 exhibits strong security practices, particularly in its limited attack surface and safe handling of database operations. The lack of historical vulnerabilities is reassuring. However, the unescaped output represents a potential weakness that should be addressed to achieve a fully robust security profile. The plugin's strengths far outweigh its weaknesses, but neglecting the unescaped output could still expose users to risk.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Source View Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Source View Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
7 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

78% escaped9 total outputs
Attack Surface

Source View Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menusourceview.php:24
actionadmin_initsourceview.php:40
Maintenance & Trust

Source View Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 30, 2019
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Source View Developer Profile

水野史土

11 plugins · 8K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Source View

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
brush: php;
Data Attributes
first-line:
Shortcode Output
<pre class="brush: php; first-line:
FAQ

Frequently Asked Questions about Source View