Wikiembedder Security & Risk Analysis

wordpress.org/plugins/wikiembedder

Embed MediaWiki in a wordpress site and allow users to navigate the wiki without leaving your wordpress page.

10 active installs v0.1 PHP + WP 3.5+ Updated Dec 23, 2017
embedmediawikiwiki
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wikiembedder Safe to Use in 2026?

Generally Safe

Score 85/100

Wikiembedder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The wikiembedder plugin v0.1 demonstrates a mixed security posture. On the positive side, it exhibits good practices regarding SQL queries, all of which are prepared, and there are no known vulnerabilities in its history. The attack surface is minimal, with only one shortcode identified and no AJAX handlers or REST API routes, and no cron events or file operations. This suggests a relatively contained plugin.

However, several areas raise concerns. The lack of nonce checks on the single entry point (the shortcode) is a significant weakness, potentially allowing for Cross-Site Request Forgery (CSRF) attacks. Furthermore, the output escaping is only partially implemented, with 67% of outputs not properly escaped, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities. The presence of external HTTP requests without apparent sanitization or authentication checks also presents a potential attack vector.

While the vulnerability history is clean, this is for version 0.1, which is an early release. The lack of comprehensive security checks, particularly around output escaping and input validation for the shortcode, outweighs the positive aspects. The plugin needs significant improvements to address these potential weaknesses before being considered secure.

Key Concerns

  • Outputs not properly escaped
  • Nonce check missing on shortcode
  • External HTTP requests without apparent checks
Vulnerabilities
None known

Wikiembedder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Wikiembedder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

33% escaped6 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wikiembedder_options (admin_menu.php:9)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Wikiembedder Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wiki] wikiembedder.php:36
WordPress Hooks 3
actionadmin_menuadmin_menu.php:2
actioninitwikiembedder.php:26
actiontemplate_redirectwikiembedder.php:37
Maintenance & Trust

Wikiembedder Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedDec 23, 2017
PHP min version
Downloads2K

Community Trust

Rating40/100
Number of ratings2
Active installs10
Developer Profile

Wikiembedder Developer Profile

datagutten

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wikiembedder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wikiembedder/wikiembedder.css
Version Parameters
wikiembedder/wikiembedder.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-wikiurldata-page
JS Globals
wikiurlwikidirpage
REST Endpoints
/api.php?action=query/api.php?action=parse
Shortcode Output
<div class='wikiembedder-wrapper'>
FAQ

Frequently Asked Questions about Wikiembedder