WP Calais Archive Tagger Security & Risk Analysis

wordpress.org/plugins/wp-calais-archive-tagger

Goes through your archives and adds tags to your posts based on semantic analysis.

10 active installs v1.5 PHP + WP 2.3+ Updated Feb 9, 2012
semantic-websemwebtaggertaggingtags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Calais Archive Tagger Safe to Use in 2026?

Generally Safe

Score 85/100

WP Calais Archive Tagger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The wp-calais-archive-tagger v1.5 plugin presents a mixed security profile. On the positive side, it does not appear to have any recorded vulnerabilities or known CVEs, which is a strong indicator of a relatively stable code base. Furthermore, it does not utilize dangerous functions, perform file operations, or make external HTTP requests in a way that inherently suggests risk. The use of prepared statements for SQL queries also mitigates a common class of vulnerabilities.

However, significant concerns are raised by the static analysis. The presence of one AJAX handler without authentication checks creates a direct attack vector. The taint analysis revealing two flows with unsanitized paths, even without critical or high severity, suggests potential for unexpected behavior or data manipulation if these paths are triggered. The most alarming finding is the complete lack of output escaping, meaning any data processed or displayed by the plugin could be vulnerable to cross-site scripting (XSS) attacks. The absence of nonce checks and capability checks on the exposed AJAX endpoint further exacerbates these risks.

In conclusion, while the plugin's vulnerability history is clean and it avoids certain high-risk coding practices, the combination of an unprotected AJAX endpoint, unsanitized taint flows, and critically, a complete absence of output escaping, creates a substantial security risk. The plugin is not hardened against common web attack vectors, making it a target for exploitation.

Key Concerns

  • Unprotected AJAX handler
  • Taint flows with unsanitized paths
  • No output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Calais Archive Tagger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Calais Archive Tagger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
calais_archive (calais_archive_tagger.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP Calais Archive Tagger Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_calais_archive_runcalais_archive_tagger.php:90
WordPress Hooks 1
actionadmin_menucalais_archive_tagger.php:14
Maintenance & Trust

WP Calais Archive Tagger Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedFeb 9, 2012
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Calais Archive Tagger Developer Profile

dangrossman

3 plugins · 70 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Calais Archive Tagger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Calais Archive Tagger