
Visual Recipe Index Security & Risk Analysis
wordpress.org/plugins/visual-recipe-indexVisual Recipe Index - Plugin to create an automatically updating recipe index with pictures.
Is Visual Recipe Index Safe to Use in 2026?
Generally Safe
Score 100/100Visual Recipe Index has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "visual-recipe-index" v1.3.1 plugin exhibits a generally strong security posture, with several positive indicators. The absence of known CVEs and a lack of critical or high-severity issues in its vulnerability history are encouraging. The code analysis reveals a commendable use of prepared statements for all SQL queries, a good number of capability checks and nonce checks, and a high percentage of properly escaped output, all of which are crucial for preventing common web vulnerabilities. The plugin also demonstrates good practice by not bundling external libraries, reducing the risk of outdated or vulnerable dependencies.
However, a significant concern arises from the taint analysis, which identified 8 flows with unsanitized paths. While the severity is reported as low (no critical or high), the presence of these unsanitized paths is a red flag, indicating potential vulnerabilities if these paths are ever exposed to user-controlled input without proper sanitization. The attack surface, though small with only two shortcodes and no AJAX or REST API endpoints without checks, still requires careful monitoring. The high number of file operations (56) could also be an area to scrutinize for potential misconfigurations or vulnerabilities if not handled securely.
In conclusion, while the plugin has many strengths and a clean vulnerability history, the taint analysis findings demand attention. The plugin developers should prioritize addressing the identified unsanitized path flows. Continued vigilance and regular security audits are recommended, especially given the number of file operations.
Key Concerns
- Taint analysis: 8 unsanitized path flows
- Output escaping: 21% not properly escaped
- File operations: 56 total, potential risk if not sanitized
Visual Recipe Index Security Vulnerabilities
Visual Recipe Index Code Analysis
Output Escaping
Data Flow Analysis
Visual Recipe Index Attack Surface
Shortcodes 2
WordPress Hooks 14
Maintenance & Trust
Visual Recipe Index Maintenance & Trust
Maintenance Signals
Community Trust
Visual Recipe Index Alternatives
No alternatives data available yet.
Visual Recipe Index Developer Profile
1 plugin · 300 total installs
How We Detect Visual Recipe Index
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/visual-recipe-index/css/style.css/wp-content/plugins/visual-recipe-index/js/riview.js/wp-content/plugins/visual-recipe-index/js/jquery.colorbox-min.js/wp-content/plugins/visual-recipe-index/js/easypaginate.min.js/wp-content/plugins/visual-recipe-index/css/cgview-settings.css/wp-content/plugins/visual-recipe-index/js/recipe_index_options.js/wp-content/plugins/visual-recipe-index/js/riview.js/wp-content/plugins/visual-recipe-index/js/jquery.colorbox-min.js/wp-content/plugins/visual-recipe-index/js/easypaginate.min.js/wp-content/plugins/visual-recipe-index/js/recipe_index_options.jsvisual-recipe-index/style.css?ver=visual-recipe-index/riview.js?ver=visual-recipe-index/jquery.colorbox-min.js?ver=visual-recipe-index/easypaginate.min.js?ver=visual-recipe-index/cgview-settings.css?ver=visual-recipe-index/recipe_index_options.js?ver=HTML / DOM Fingerprints
ri_scshortcode_optionsSHORTCODE GENERATORdata-iddata-namedata-orderbydata-orderdata-numdata-excludeposts+10 moreidcat[riview]