
WP Code Prettify Security & Risk Analysis
wordpress.org/plugins/wp-code-prettifyThis plugin enable syntax highlighting of code snippets in your post using Google Code Prettify.
Is WP Code Prettify Safe to Use in 2026?
Generally Safe
Score 85/100WP Code Prettify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-code-prettify" v0.2.8 plugin exhibits a generally good security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the plugin demonstrates strong practices by exclusively using prepared statements for all SQL queries and having no recorded vulnerabilities or CVEs, indicating a stable and well-maintained codebase over time. The plugin also includes nonce and capability checks, which are essential for securing WordPress functionalities.
However, a significant concern arises from the output escaping analysis. With 14 total outputs and 0% properly escaped, this suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users without proper sanitization or escaping could be manipulated by attackers to inject malicious scripts. While taint analysis shows no unsanitized paths, this might not fully capture all potential XSS vectors if the analysis scope was limited or if the untrusted input doesn't directly lead to a path flow detected by the tool. The presence of file operations, while not inherently insecure, warrants careful review to ensure they are not being used in a way that could be exploited by an attacker.
In conclusion, the plugin's strengths lie in its limited attack surface and secure database interactions. The primary weakness is the lack of output escaping, which presents a critical XSS risk. Addressing this issue should be the highest priority to improve the plugin's overall security. The absence of historical vulnerabilities is positive, but the current code analysis points to a specific, actionable security flaw.
Key Concerns
- 0% output escaping
WP Code Prettify Security Vulnerabilities
WP Code Prettify Code Analysis
Output Escaping
Data Flow Analysis
WP Code Prettify Attack Surface
WordPress Hooks 6
Maintenance & Trust
WP Code Prettify Maintenance & Trust
Maintenance Signals
Community Trust
WP Code Prettify Alternatives
Prettify GC Syntax Highlighter
prettify-gc-syntax-highlighter
Your code will look exactly like it does on google-code.
google-syntax
google-syntax
This is a code prettify plugin. the code higlighting effect will be seen directly in the mce editor.
Smart Syntax
smart-syntax
Automatic google prettify syntax highlighting for jetpack markdown fenced code blocks
WP-Markdown
wp-markdown
Allows Markdown to be enabled in posts, comments and bbPress forums.
CC-Syntax-Highlight
cc-syntax-highlight
This plugin allows you very simply syntax highlight source code in your content using highlight.js or google-code-prettify libraries.
WP Code Prettify Developer Profile
2 plugins · 1K total installs
How We Detect WP Code Prettify
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-code-prettify/css/style.css/wp-content/plugins/wp-code-prettify/js/prettify.js/wp-content/plugins/wp-code-prettify/js/prettify.jswp-code-prettify/css/style.css?ver=wp-code-prettify/js/prettify.js?ver=HTML / DOM Fingerprints
prettyprint<!--wp code prettify--><!--//wp code prettify-->prettify_cssprettify_customwpCodePrettifyOnLoadprettyPrint$