WP_Folksonomy Security & Risk Analysis

wordpress.org/plugins/wp-folksonomy

This plugin allows your readers to add tags to your posts (like Flickr or del.icio.us).

10 active installs v0.8 PHP + WP 2.3+ Updated Sep 22, 2008
collaborativefolksonomysubmittedtagsuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP_Folksonomy Safe to Use in 2026?

Generally Safe

Score 85/100

WP_Folksonomy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The wp-folksonomy plugin v0.8 exhibits a mixed security posture. On the positive side, there are no known CVEs, the attack surface appears to be minimal with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and there are no file operations or external HTTP requests, reducing potential points of compromise. The presence of capability checks, though limited, is a good practice.

However, significant concerns arise from the static analysis. A substantial 60% of SQL queries do not utilize prepared statements, introducing a high risk of SQL injection vulnerabilities. Furthermore, only 14% of output is properly escaped, indicating a strong possibility of cross-site scripting (XSS) vulnerabilities. The taint analysis reveals two high-severity flows with unsanitized paths, which could lead to critical security issues if these paths are exploitable. The absence of nonce checks on any entry points, combined with a lack of robust authorization checks on the limited entry points, further exacerbates these risks.

While the plugin has no historical vulnerabilities, this could be due to its limited exposure or a lack of thorough security auditing. The current code analysis, however, points to specific, actionable security weaknesses that need immediate attention. In conclusion, the plugin has strengths in its limited attack surface and lack of historical issues, but the significant risks identified in SQL query handling, output escaping, and taint flows, coupled with the absence of nonce checks, indicate a vulnerable state.

Key Concerns

  • High severity unsanitized paths in taint analysis
  • High severity unsanitized paths in taint analysis
  • Significant number of SQL queries not using prepared statements
  • Low percentage of properly escaped output
  • Missing nonce checks on entry points
  • Limited capability checks
Vulnerabilities
None known

WP_Folksonomy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP_Folksonomy Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
7 prepared
Unescaped Output
25
4 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

41% prepared17 total queries

Output Escaping

14% escaped29 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
wp_folksonomy_subpanel (wp_folksonomy.php:305)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP_Folksonomy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuwp_folksonomy.php:19
actionpre_get_postswp_folksonomy.php:21
actioninitwp_folksonomy.php:281
actionwp_print_scriptswp_folksonomy.php:421
actionwp_headwp_folksonomy.php:431
Maintenance & Trust

WP_Folksonomy Maintenance & Trust

Maintenance Signals

WordPress version tested2.5.1
Last updatedSep 22, 2008
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP_Folksonomy Developer Profile

scottsm

5 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP_Folksonomy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP_Folksonomy