Sravnitel Security & Risk Analysis

wordpress.org/plugins/sravnitel

Sravnitel is a WordPress plugin by Elphel Inc. based on a jQuery plugin jquery.sravnitel.js.

10 active installs v1.3 PHP + WP 4.5.5+ Updated Feb 27, 2017
before-after-sliderimagespagepostsvisual-composer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sravnitel Safe to Use in 2026?

Generally Safe

Score 85/100

Sravnitel has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'sravnitel' v1.3 plugin exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and proper output escaping all indicate good development practices aimed at preventing common web vulnerabilities. Furthermore, the lack of external HTTP requests and file operations limits the potential for remote code execution or sensitive data exfiltration.

The plugin's attack surface is minimal, with only one shortcode and no unprotected AJAX handlers or REST API routes. The taint analysis revealing zero flows with unsanitized paths is also a very positive sign, suggesting that user-supplied data is being handled securely. The plugin's vulnerability history is clean, with no recorded CVEs, which further bolsters confidence in its current security state.

However, the complete absence of nonce checks and capability checks across all entry points (even though the attack surface is small and unprotected entry points are zero) represents a potential area for improvement. While the current structure may not immediately lead to vulnerabilities due to the limited attack surface, implementing these standard WordPress security measures would further harden the plugin against potential future threats or when integrated into more complex environments. Overall, 'sravnitel' v1.3 appears to be a securely coded plugin, with its primary weakness being the lack of standard authentication and authorization checks on its sole entry point.

Key Concerns

  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

Sravnitel Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Sravnitel Release Timeline

v1.3Current
v1.2
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Sravnitel Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Sravnitel Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[sravnitel] inc\shortcode.php:132
WordPress Hooks 2
actionwp_enqueue_scriptsinc\enqueue.php:30
actioninitsravnitel.php:37
Maintenance & Trust

Sravnitel Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedFeb 27, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Sravnitel Developer Profile

okdzhimiev

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sravnitel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sravnitel/assets/css/sravnitel.css/wp-content/plugins/sravnitel/assets/js/jquery.sravnitel.js
Script Paths
/wp-content/plugins/sravnitel/assets/js/jquery.sravnitel.js
Version Parameters
sravnitel-stylesravnitel

HTML / DOM Fingerprints

CSS Classes
sravnitel
JS Globals
jQuery
Shortcode Output
<div id="sravnitel_" style="position:relative;" class="sravnitel"></div><script> jQuery(window).load(function(){ jQuery("#sravnitel_").sravnitel({
FAQ

Frequently Asked Questions about Sravnitel