Spoken Word Security & Risk Analysis

wordpress.org/plugins/spoken-word

Add text-to-speech (TTS) to content, with playback controls, read-along highlighting, multi-lingual support, and settings for rate, pitch, and voice.

100 active installs v1.0.1 PHP 5.4+ WP 4.7+ Updated Jan 21, 2018
audiospeech-synthesistext-to-speechttsvoice
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Spoken Word Safe to Use in 2026?

Generally Safe

Score 85/100

Spoken Word has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "spoken-word" v1.0.1 plugin exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified attack surface, dangerous functions, unsanitized taint flows, or raw SQL queries is highly commendable. Furthermore, the plugin demonstrates excellent coding practices with 100% proper output escaping and no observed file operations or external HTTP requests. The vulnerability history is also clean, with no recorded CVEs, indicating a consistent commitment to security by the developers.

Despite the overwhelmingly positive findings, the static analysis does highlight a complete absence of capability checks and nonce checks. While there are currently no exposed entry points that would necessitate these, their complete omission in the codebase suggests a potential oversight. If the plugin were to evolve and introduce any AJAX handlers, REST API routes, or shortcodes in the future, this lack of built-in authorization mechanisms could become a significant security risk.

In conclusion, "spoken-word" v1.0.1 is currently a very secure plugin. Its development adheres to best practices in many critical areas. The primary concern stems from the potential future risk if the attack surface were to expand, as the fundamental authorization and nonce checking mechanisms are entirely absent from the current code.

Key Concerns

  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Spoken Word Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Spoken Word Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Spoken Word Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_noticesspoken-word.php:39
actionwp_enqueue_scriptsspoken-word.php:94
actionplugins_loadedspoken-word.php:142
Maintenance & Trust

Spoken Word Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJan 21, 2018
PHP min version5.4
Downloads6K

Community Trust

Rating94/100
Number of ratings7
Active installs100
Developer Profile

Spoken Word Developer Profile

Weston Ruter

22 plugins · 437K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
4499 days
View full developer profile
Detection Fingerprints

How We Detect Spoken Word

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/spoken-word/css/style.css/wp-content/plugins/spoken-word/dist/spoken-word.js/wp-content/plugins/spoken-word/dist/dialog-polyfill.js/wp-content/plugins/spoken-word/dist/dialog-polyfill.css
Script Paths
/wp-content/plugins/spoken-word/dist/spoken-word.js/wp-content/plugins/spoken-word/dist/dialog-polyfill.js
Version Parameters
spoken-word/css/style.css?ver=spoken-word/dist/spoken-word.js?ver=

HTML / DOM Fingerprints

JS Globals
spokenWord
FAQ

Frequently Asked Questions about Spoken Word