JSM file_get_contents() Shortcode Security & Risk Analysis

wordpress.org/plugins/wp-file-get-contents

A safe and reliable WordPress shortcode for PHP's file_get_contents() function.

300 active installs v2.7.1 PHP 7.4.33+ WP 6.0+ Updated Mar 11, 2026
filefile_get_contentsincludeshortcodeurl
77
B · Generally Safe
CVEs total2
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is JSM file_get_contents() Shortcode Safe to Use in 2026?

Mostly Safe

Score 77/100

JSM file_get_contents() Shortcode is generally safe to use. 2 past CVEs were resolved. Keep it updated.

2 known CVEs 1 unpatched Last CVE: Sep 22, 2025Updated 23d ago
Risk Assessment

The "wp-file-get-contents" plugin v2.7.1 exhibits a mixed security posture. Static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and ensuring all output is properly escaped. There are no identified dangerous functions, external HTTP requests, or bundled libraries to raise immediate concern, and the taint analysis shows no critical or high severity flows.

However, the plugin's vulnerability history is a significant concern. It has a total of two known CVEs, with one currently unpatched. Both historical vulnerabilities were rated as medium severity and involved Cross-site Scripting (XSS) and Server-Side Request Forgery (SSRF). The presence of an unpatched medium-severity vulnerability, especially one that has historically included SSRF risks, presents a tangible security risk. While the current code analysis doesn't reveal these specific weaknesses, the past indicates potential for input sanitization or improper handling of external resources, which could be exploited if the underlying code has not been completely remediated or if new, related vulnerabilities emerge.

In conclusion, the plugin's code demonstrates good defensive programming in its current state, with a limited attack surface and secure handling of common vulnerabilities like SQL injection and XSS in its output. The primary weakness lies in its past and an outstanding unpatched vulnerability. Users should be aware of this history, and immediate attention should be paid to patching the known vulnerability.

Key Concerns

  • Unpatched CVE
  • Vulnerability history of XSS and SSRF
Vulnerabilities
2

JSM file_get_contents() Shortcode Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-58653medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

JSM file_get_contents() Shortcode <= 2.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 22, 2025Unpatched
CVE-2023-6991medium · 5.4Server-Side Request Forgery (SSRF)

JSM file_get_contents() Shortcode <= 2.7.0 - Authenticated (Contributor+) Server-Side Request Forgery via Shortcode

Dec 21, 2023 Patched in 2.7.1 (33d)
Code Analysis
Analyzed Mar 16, 2026

JSM file_get_contents() Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped11 total outputs
Attack Surface

JSM file_get_contents() Shortcode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedwp-file-get-contents.php:48
actionsave_postwp-file-get-contents.php:63
Maintenance & Trust

JSM file_get_contents() Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 11, 2026
PHP min version7.4.33
Downloads13K

Community Trust

Rating100/100
Number of ratings1
Active installs300
Developer Profile

JSM file_get_contents() Shortcode Developer Profile

JS Morisset

31 plugins · 33K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
12 days
View full developer profile
Detection Fingerprints

How We Detect JSM file_get_contents() Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-file-get-contents/assets/css/wpfgc-code-highlight.css/wp-content/plugins/wp-file-get-contents/assets/js/wpfgc-code-highlight.js

HTML / DOM Fingerprints

CSS Classes
wpfgc-code-highlight
HTML Comments
<!-- Start: wp-file-get-contents --><!-- End: wp-file-get-contents -->
Data Attributes
data-wpfgc-content-hash
Shortcode Output
<p><strong>WP_FGC: </strong><p><strong>WPFGC:
FAQ

Frequently Asked Questions about JSM file_get_contents() Shortcode