Sweet Glossary Security & Risk Analysis

wordpress.org/plugins/sweet-glossary

A simple, beautiful and SEO friendly glossary plugin. Place the shortcode wherever you want and display the list of glossary terms wherever you want.

10 active installs v1.0.0 PHP 5.6+ WP 3.0.1+ Updated Jan 21, 2022
glossaryseoshortcodessweet-glossary
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sweet Glossary Safe to Use in 2026?

Generally Safe

Score 85/100

Sweet Glossary has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "sweet-glossary" v1.0.0 plugin demonstrates a generally strong security posture due to its adherence to several best practices. Notably, all SQL queries are prepared, all identified output is properly escaped, and there are no dangerous functions, file operations, or external HTTP requests. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting a history of secure development or diligent maintenance. However, several areas of concern exist. The absence of nonce checks and capability checks across all entry points, particularly the single shortcode, is a significant weakness. While the static analysis did not identify any unescaped user input in taint flows, the fact that two flows with unsanitized paths were found warrants attention, even if they did not reach a critical or high severity in this analysis. The combination of a shortcode as an entry point without any authentication or authorization checks creates a potential avenue for attack.

In conclusion, while the plugin benefits from secure coding practices like prepared statements and output escaping, the lack of input validation and authorization mechanisms on its shortcode represents a substantial risk. The fact that taint analysis flagged unsanitized paths, even without critical severity, should not be overlooked. Future versions should prioritize implementing nonce and capability checks to mitigate potential vulnerabilities that could arise from these oversight.

Key Concerns

  • Missing nonce check for entry points
  • Missing capability check for entry points
  • Taint flow with unsanitized paths
Vulnerabilities
None known

Sweet Glossary Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Sweet Glossary Release Timeline

v1.0.1
Code Analysis
Analyzed Apr 16, 2026

Sweet Glossary Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
update_glossary_settings (admin/class-sweet-glossary-admin.php:179)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Sweet Glossary Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[sweetglossary] public/class-sweet-glossary-public.php:161
WordPress Hooks 9
actionplugins_loadedincludes/class-sweet-glossary.php:142
actionadmin_enqueue_scriptsincludes/class-sweet-glossary.php:157
actionadmin_enqueue_scriptsincludes/class-sweet-glossary.php:158
actionadmin_initincludes/class-sweet-glossary.php:159
actionadmin_initincludes/class-sweet-glossary.php:160
actioninitincludes/class-sweet-glossary.php:174
actioninitincludes/class-sweet-glossary.php:175
actionwp_enqueue_scriptsincludes/class-sweet-glossary.php:176
actionwp_enqueue_scriptsincludes/class-sweet-glossary.php:177
Maintenance & Trust

Sweet Glossary Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJan 21, 2022
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Sweet Glossary Developer Profile

Guillermo

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sweet Glossary

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sweet-glossary/css/sweet-glossary-admin.css/wp-content/plugins/sweet-glossary/js/sweet-glossary-admin.js
Script Paths
/wp-content/plugins/sweet-glossary/js/sweet-glossary-admin.js
Version Parameters
sweet-glossary-admin.css?ver=sweet-glossary-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
setting-example
Data Attributes
name="sweet-glossary_slug"id="sweet-glossary_slug"
FAQ

Frequently Asked Questions about Sweet Glossary