Tika Doc PDF Indexer Security & Risk Analysis

wordpress.org/plugins/tika-doc-pdf-indexer

This plugin will automatically index pdf uploaded files from the media manager.

10 active installs v1.2.0 PHP + WP 4.8+ Updated Unknown
indexertika
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Tika Doc PDF Indexer Safe to Use in 2026?

Generally Safe

Score 100/100

Tika Doc PDF Indexer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "tika-doc-pdf-indexer" v1.2.0 plugin demonstrates several strong security practices, including the complete absence of SQL injection vulnerabilities due to prepared statements and proper output escaping across all detected outputs. The plugin also correctly implements nonce and capability checks, suggesting a deliberate effort to secure its functionality. Furthermore, the lack of any recorded CVEs indicates a history of responsible development or limited exposure to known attack vectors.

However, the static analysis reveals a critical risk related to taint analysis. Specifically, there is a flow with an unsanitized path identified as critical severity. This indicates a potential vulnerability where user-supplied input could be used to construct a file path in an unsafe manner, potentially leading to directory traversal or arbitrary file access. Additionally, the presence of the `proc_open` function, a powerful but potentially dangerous function if not handled with extreme care, warrants attention, especially in conjunction with the unsanitized path flow.

Overall, while the plugin exhibits good fundamental security hygiene, the critical taint flow represents a significant and actionable security concern that needs immediate remediation. The lack of historical vulnerabilities is positive, but it does not negate the importance of addressing the identified critical issue.

Key Concerns

  • Critical severity unsanitized path in taint analysis
  • Use of potentially dangerous function 'proc_open'
Vulnerabilities
None known

Tika Doc PDF Indexer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Tika Doc PDF Indexer Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
21 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

proc_open$process = proc_open( $command, $descriptorspec, $pipes );includes\class-tika-doc-pdf-indexer-functions.php:62

Output Escaping

100% escaped21 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<class-tika-doc-pdf-indexer-functions> (includes\class-tika-doc-pdf-indexer-functions.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Tika Doc PDF Indexer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadd_attachmentincludes\class-tika-doc-pdf-indexer-functions.php:12
actionadd_meta_boxesincludes\class-tika-doc-pdf-indexer-functions.php:85
filtersolr_post_statusincludes\class-tika-doc-pdf-indexer-functions.php:114
filterupload_mimesincludes\class-tika-doc-pdf-indexer-functions.php:152
actionadmin_print_scriptsincludes\class-tika-doc-pdf-indexer-functions.php:255
actionadmin_print_stylesincludes\class-tika-doc-pdf-indexer-functions.php:256
actionsave_postincludes\class-tika-doc-pdf-indexer-functions.php:296
actioninitincludes\class-tika-doc-pdf-indexer-settings.php:148
actionadmin_initincludes\class-tika-doc-pdf-indexer-settings.php:151
actionadmin_menuincludes\class-tika-doc-pdf-indexer-settings.php:154
actioninitincludes\class-tika-doc-pdf-indexer.php:338
Maintenance & Trust

Tika Doc PDF Indexer Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Tika Doc PDF Indexer Developer Profile

Carl Alberto

6 plugins · 400 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Tika Doc PDF Indexer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tika-doc-pdf-indexer/js/tdpi.js/wp-content/plugins/tika-doc-pdf-indexer/css/tdpi.css
Script Paths
/wp-content/plugins/tika-doc-pdf-indexer/js/tdpi.js
Version Parameters
tika-doc-pdf-indexer/js/tdpi.js?ver=tika-doc-pdf-indexer/css/tdpi.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- TODO: immediately exit if not supported cpt. --><!-- phpcs:disable -- finding a proper way to include document_root $server variable --><!-- phpcs:enable --><!-- TODO: add custom error logging location. -->+4 more
Data Attributes
tdpi_noncetdpi_filetdpi_file_upload
JS Globals
tdpi_extract_datatdpi_save_indexed_datatdpi_add_upload_file_metaboxestdpi_restrict_mimetypestdpi_file_upload
FAQ

Frequently Asked Questions about Tika Doc PDF Indexer