WP-Git-Embed Security & Risk Analysis

wordpress.org/plugins/wp-git-embed

Embed GitHub, Gist or Bitbucket files.

10 active installs v0.4 PHP + WP 3.0.1+ Updated Unknown
bitbucketembedgistgitgithub
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Git-Embed Safe to Use in 2026?

Generally Safe

Score 100/100

WP-Git-Embed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The wp-git-embed plugin v0.4 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs, coupled with the fact that all SQL queries utilize prepared statements and all output is properly escaped, are significant strengths. Furthermore, the plugin demonstrates a small attack surface with zero entry points identified, which is commendable. However, there are some notable concerns. The presence of two instances of `preg_replace(/e)` is a red flag, as this function is known to be dangerous and can be exploited for remote code execution if not handled with extreme care and proper sanitization. The plugin also lacks nonce checks and capability checks, which are crucial for preventing various types of attacks, especially if any of the entry points were to become exposed or if new ones are added in future versions. The file operation, while only one, is another area that warrants attention due to potential security implications if not implemented securely. In conclusion, while the plugin has a clean history and good practices in many areas, the identified dangerous functions and missing security checks represent potential vulnerabilities that should be addressed.

Key Concerns

  • Dangerous function: preg_replace(/e)
  • Missing nonce checks
  • Missing capability checks
  • File operations without specific security context
Vulnerabilities
None known

WP-Git-Embed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Git-Embed Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace("/ewp-git-embed.php:113
preg_replace(/e)preg_replace("/ewp-git-embed.php:114
Attack Surface

WP-Git-Embed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterthe_contentwp-git-embed.php:25
filterthe_excerptwp-git-embed.php:26
filtercomment_textwp-git-embed.php:27
actionplugins_loadedwp-git-embed.php:207
Maintenance & Trust

WP-Git-Embed Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Git-Embed Developer Profile

Guilherme Baptista

2 plugins · 110 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Git-Embed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wp-git-embed
Shortcode Output
<div class="wp-git-embed"view rawview file on<strong>GitHub</strong>
FAQ

Frequently Asked Questions about WP-Git-Embed