Dojox WordPress Syntax Highlighter Security & Risk Analysis

wordpress.org/plugins/wp-dojox-syntax-highlighter

Free syntax highlighter written in Java Script as Wordpress Plugin.

10 active installs v0.3 PHP + WP 2.0.2+ Updated Apr 4, 2010
codehighlighthighlightersyntax
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dojox WordPress Syntax Highlighter Safe to Use in 2026?

Generally Safe

Score 85/100

Dojox WordPress Syntax Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The wp-dojox-syntax-highlighter v0.3 plugin demonstrates a generally strong security posture, particularly in its handling of SQL queries, which are all prepared statements. The absence of any recorded vulnerabilities or CVEs in its history is a significant positive indicator, suggesting a history of responsible development and a lack of exploitable weaknesses. Furthermore, the static analysis reveals no critical code signals such as dangerous functions, file operations, external HTTP requests, or taint flows, which further reinforces its apparent security.

However, a notable concern arises from the output escaping analysis, where 100% of the identified outputs are not properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities if user-supplied or dynamic data is being rendered directly into the output without sanitization. While the attack surface appears minimal with no apparent entry points like AJAX handlers, REST API routes, or shortcodes exposed without checks, the lack of output escaping remains a significant weakness that could be exploited in specific scenarios.

In conclusion, the plugin benefits from a clean vulnerability history and secure handling of sensitive operations like database queries. The primary area requiring attention is the consistent failure to escape output, which presents a potential XSS risk. Addressing this output escaping issue would significantly improve the plugin's overall security profile.

Key Concerns

  • 100% of outputs not properly escaped
Vulnerabilities
None known

Dojox WordPress Syntax Highlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dojox WordPress Syntax Highlighter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Dojox WordPress Syntax Highlighter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headwp-dojox-highlight.php:25
Maintenance & Trust

Dojox WordPress Syntax Highlighter Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedApr 4, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Dojox WordPress Syntax Highlighter Developer Profile

s a

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dojox WordPress Syntax Highlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-dojox-syntax-highlighter/dh.css/wp-content/plugins/wp-dojox-syntax-highlighter/dh.js
Script Paths
http://ajax.googleapis.com/ajax/libs/dojo/1.4.1/dojo/dojo.xd.js
Version Parameters
wp-dojox-syntax-highlighter/dh.css?ver=wp-dojox-syntax-highlighter/dh.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- wp-dojox-highlight plugin start - http://saquery.com/wordpress --><!-- wp-dojox-highlight end -->
Data Attributes
id="syntaxSheet"
JS Globals
djConfig
FAQ

Frequently Asked Questions about Dojox WordPress Syntax Highlighter