Turgenev Security & Risk Analysis

wordpress.org/plugins/turgenev

Assesses the risk of falling under the "Baden-Baden" and shows what needs to be fixed. Enjoy :)

10 active installs v1.4 PHP 5.6+ WP 5.0+ Updated Aug 13, 2020
content-analysisgutenberggutenberg-editorreadabilityseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Turgenev Safe to Use in 2026?

Generally Safe

Score 85/100

Turgenev has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "turgenev" v1.4 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals a commendable lack of critical security issues, including no detected dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests (though one is present in the code signals, it might be a benign or misclassified external request). The complete absence of known vulnerabilities in its history further contributes to a perception of stability. However, significant concerns arise from the limited output escaping and the complete absence of nonce and capability checks across all entry points, which are reported as zero. This indicates a potential for cross-site scripting (XSS) vulnerabilities if any of the 13 output operations are vulnerable to injection, and a serious lack of access control for any operations that might be exposed through undiscovered or unanalyzed entry points.

The plugin's attack surface is reported as zero for all common entry points (AJAX, REST API, shortcodes, cron events). While this appears highly secure at first glance, it raises a flag. It's unusual for a plugin with external HTTP requests and output operations to have absolutely no entry points. This could indicate that the static analysis might not have fully identified all potential entry points, or that the plugin's functionality is entirely passive and doesn't require user interaction via these common methods. The low percentage of properly escaped output (31%) is a significant weakness, suggesting a high likelihood of XSS vulnerabilities if user-supplied data is being outputted without adequate sanitization. The lack of nonce checks and capability checks on any entry points (even if the reported entry points are zero) is a critical oversight. If any functionality were to be triggered, it would be entirely unprotected against unauthorized execution or privilege escalation.

Key Concerns

  • Low output escaping percentage
  • No nonce checks on entry points
  • No capability checks on entry points
  • External HTTP request detected
Vulnerabilities
None known

Turgenev Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Turgenev Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

31% escaped13 total outputs
Attack Surface

Turgenev Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filterplugin_row_metaincludes\class-tgev-admin.php:25
actionadmin_menuincludes\class-tgev-admin.php:26
actionadmin_initincludes\class-tgev-admin.php:27
actionadd_meta_boxesincludes\class-tgev-admin.php:31
actionplugins_loadedincludes\class-turgenev.php:112
actioninitincludes\class-turgenev.php:113
actionenqueue_block_editor_assetsincludes\class-turgenev.php:114
actionadmin_enqueue_scriptsincludes\class-turgenev.php:115
Maintenance & Trust

Turgenev Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 13, 2020
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Turgenev Developer Profile

Anton Lokotkov

4 plugins · 320 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Turgenev

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/turgenev/build/index_old.js/wp-content/plugins/turgenev/build/index.css/wp-content/plugins/turgenev/build/index.js
Script Paths
/wp-content/plugins/turgenev/build/index_old.js/wp-content/plugins/turgenev/build/index.js
Version Parameters
turgenev/build/index_old.js?ver=turgenev/build/index.css?ver=turgenev/build/index.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-tgev-block-id
JS Globals
turgenev_ajax
FAQ

Frequently Asked Questions about Turgenev