Validated Security & Risk Analysis

wordpress.org/plugins/validated

This plugin will allow you to check your pages/posts HTML against the W3C Validator.

700 active installs v2.1.2 PHP + WP 3.7+ Updated Dec 4, 2019
codehtmlvalidationw3cxhtml
85
A · Safe
CVEs total1
Unpatched0
Last CVEMay 28, 2014
Safety Verdict

Is Validated Safe to Use in 2026?

Generally Safe

Score 85/100

Validated has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: May 28, 2014Updated 6yr ago
Risk Assessment

The static analysis of 'validated' v2.1.2 reveals a strong adherence to secure coding practices. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal attack surface. Furthermore, the code demonstrates excellent security by avoiding dangerous functions, ensuring all SQL queries use prepared statements, and properly escaping all output. File operations and external HTTP requests are also absent, which further reduces potential vulnerabilities.

Despite these strong internal code practices, the plugin has a history of vulnerabilities, including one documented CVE. The presence of a past medium severity Cross-Site Scripting (XSS) vulnerability, although last seen in 2014 and currently unpatched, raises a flag. The absence of nonce checks and capability checks, while not directly exploited in the current static analysis due to the lack of entry points, represents potential weaknesses if the attack surface were to expand or if the plugin's functionality changed in future versions.

In conclusion, 'validated' v2.1.2 exhibits a very secure internal code structure with best practices in place for SQL, output, and avoiding dangerous functions. However, the past vulnerability history, specifically an XSS issue, and the lack of certain security checks like nonces and capability checks on what is currently a zero-attack-surface, suggest a need for ongoing vigilance and a potential risk if the plugin's design evolves.

Key Concerns

  • Past medium vulnerability (XSS)
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
1

Validated Security Vulnerabilities

CVEs by Year

1 CVE in 2014
2014
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2014-4564medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Validated <= 1.0.2 - Cross-Site Scripting

May 28, 2014 Patched in 2.0.0 (3527d)
Code Analysis
Analyzed Mar 16, 2026

Validated Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Attack Surface

Validated Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedvalidated.php:30
Maintenance & Trust

Validated Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedDec 4, 2019
PHP min version
Downloads25K

Community Trust

Rating80/100
Number of ratings5
Active installs700
Developer Profile

Validated Developer Profile

Allan Collins

4 plugins · 830 total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
3527 days
View full developer profile
Detection Fingerprints

How We Detect Validated

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/validated/css/validated.css/wp-content/plugins/validated/js/validated.js
Script Paths
/wp-content/plugins/validated/js/validated.js
Version Parameters
validated/css/validated.css?ver=validated/js/validated.js?ver=

HTML / DOM Fingerprints

CSS Classes
validated-form
FAQ

Frequently Asked Questions about Validated