WP Chords Security & Risk Analysis

wordpress.org/plugins/wp-chords

WP Chords allows you to format and display the chords on your blog including mobile friendly interface and AMP functionality.

200 active installs v1.1.0 PHP 5.2.4+ WP 4.6+ Updated May 10, 2021
chordsguitarmusicsongsukulele
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Chords Safe to Use in 2026?

Generally Safe

Score 85/100

WP Chords has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The wp-chords v1.1.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, file operations, and external HTTP requests. All SQL queries are properly prepared, and there are no known historical vulnerabilities (CVEs), suggesting a generally well-maintained codebase. However, significant concerns arise from its attack surface and output handling. The presence of one unprotected AJAX handler is a notable weakness, as it represents a direct entry point that could be exploited if not properly secured. Furthermore, the taint analysis revealing two flows with unsanitized paths, even without critical or high severity, indicates potential for unexpected behavior or data manipulation if user input is not rigorously validated before being used. The relatively low percentage of properly escaped output also raises concerns about potential cross-site scripting (XSS) vulnerabilities, although the taint analysis didn't flag these as critical.

Key Concerns

  • Unprotected AJAX handler
  • Taint flows with unsanitized paths
  • Output escaping is only 57% proper
  • Missing nonce checks on AJAX
Vulnerabilities
None known

WP Chords Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Chords Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped7 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wpchords_get_wpchords (init.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP Chords Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_get_wpchordsinit.php:59

Shortcodes 1

[wpchords] init.php:54
WordPress Hooks 2
actionadmin_menuinit.php:71
actionadmin_initinit.php:76
Maintenance & Trust

WP Chords Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 10, 2021
PHP min version5.2.4
Downloads6K

Community Trust

Rating100/100
Number of ratings6
Active installs200
Developer Profile

WP Chords Developer Profile

emreplt

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Chords

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-chords/dist/bundle.js
Script Paths
/wp-content/plugins/wp-chords/dist/bundle.js
Version Parameters
wpchords_app:1.1.0

HTML / DOM Fingerprints

CSS Classes
akorcu-app-handlerwpChordsBodywpChordsBodyMonospaceapp-handlerheader-handlerwp-chords-tools
Data Attributes
data-nosnippetnota
JS Globals
wpchords_opt
Shortcode Output
<wpchord data-nosnippet nota="<wpchords><wp-chords-tools/><div class="app-handler akorcu-app-handler bs-iso">
FAQ

Frequently Asked Questions about WP Chords