WP Github Gist Security & Risk Analysis

wordpress.org/plugins/wp-github-gist

Embed files and gist from Github in your blog posts or pages.

40 active installs v0.5 PHP + WP 2.8+ Updated Oct 13, 2021
embedgistgithub
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 5, 2025
Safety Verdict

Is WP Github Gist Safe to Use in 2026?

Use With Caution

Score 63/100

WP Github Gist has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 5, 2025Updated 4yr ago
Risk Assessment

The wp-github-gist plugin v0.5 exhibits a mixed security posture. While it demonstrates good practices such as using prepared statements for all SQL queries and a lack of dangerous functions or file operations, significant concerns arise from the absence of security checks on its entry points and its vulnerability history. The static analysis reveals two shortcodes as entry points, but crucially, none of these have capability checks. This means any user, regardless of their WordPress role, could potentially interact with these shortcodes, which could lead to unintended behavior or information disclosure if the shortcode's functionality is not inherently secure.

The vulnerability history is a major red flag. The plugin has a known medium severity vulnerability (CVE) from 2025-09-05, and it remains unpatched. This indicates a lack of ongoing security maintenance and a history of introducing vulnerabilities. The common vulnerability type being Cross-site Scripting (XSS) is particularly concerning, as it directly impacts user security within the WordPress environment. The presence of even one unpatched medium severity CVE suggests that the plugin might be actively exploitable, posing a tangible risk to websites using it.

In conclusion, while the code exhibits some positive security habits like prepared SQL statements, the absence of permission checks on its shortcodes and the existence of an unpatched CVE are significant weaknesses. The plugin's history suggests a potential for recurring security issues. Users should exercise extreme caution and prioritize updating or replacing this plugin.

Key Concerns

  • Unpatched CVE (Medium Severity)
  • Shortcodes without capability checks
  • Low output escaping percentage (33%)
Vulnerabilities
1

WP Github Gist Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58875medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WP Github Gist <= 0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting

Sep 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP Github Gist Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

WP Github Gist Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[gist] wp-github-gist.php:69
[github] wp-github-gist.php:70
WordPress Hooks 4
actionadmin_menuwp-github-gist.php:65
actionadmin_initwp-github-gist.php:66
actionin_admin_footerwp-github-gist.php:157
actioninitwp-github-gist.php:394
Maintenance & Trust

WP Github Gist Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedOct 13, 2021
PHP min version
Downloads5K

Community Trust

Rating20/100
Number of ratings1
Active installs40
Developer Profile

WP Github Gist Developer Profile

Sudar Muthu

16 plugins · 21K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Github Gist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[gist[github
FAQ

Frequently Asked Questions about WP Github Gist