WP-Markdown Security & Risk Analysis

wordpress.org/plugins/wp-markdown

Allows Markdown to be enabled in posts, comments and bbPress forums.

400 active installs v1.6.1 PHP + WP + Updated Dec 27, 2017
codeformattingmarkdownprettifysyntax-highlighter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP-Markdown Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Markdown has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'wp-markdown' plugin v1.6.1 presents a mixed security posture. On the positive side, the plugin demonstrates good practices regarding SQL query sanitization, with 100% of queries utilizing prepared statements. Furthermore, there is no recorded vulnerability history, including CVEs, which suggests a stable and likely well-maintained codebase in terms of publicly known exploits.

However, the static analysis reveals significant areas of concern. The presence of the `create_function` is a red flag as it can be a vector for code injection if used with unsanitized input. Additionally, a substantial portion of output (63%) is not properly escaped, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks on any identified entry points, although the attack surface is reported as zero, leaves a potential for future issues if functionality is added without proper security considerations. The lack of taint analysis results also means that the potential for certain types of complex vulnerabilities remains unassessed.

In conclusion, while the plugin has a clean vulnerability history and good SQL practices, the identified `create_function` usage and significant unescaped output are notable weaknesses. The absence of any authenticated entry points is a positive, but the lack of checks on those that might exist is a concern. Users should be aware of the potential for XSS and code injection, and developers should prioritize addressing the unescaped output and consider refactoring the use of `create_function`.

Key Concerns

  • Use of dangerous function: create_function
  • Unescaped output detected (63% unescaped)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

WP-Markdown Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Markdown Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
12
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$this->utf8_strlen = create_function('$text', 'return preg_match_all(markdown-extra.php:1576

Output Escaping

37% escaped19 total outputs
Attack Surface

WP-Markdown Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 27
actioninitwp-markdown.php:49
actionset_current_userwp-markdown.php:50
actionadmin_initwp-markdown.php:51
filterpre_comment_contentwp-markdown.php:70
filterwp_insert_post_datawp-markdown.php:71
filterbbp_new_reply_pre_contentwp-markdown.php:72
filterbbp_edit_reply_pre_contentwp-markdown.php:73
filterbbp_new_topic_pre_contentwp-markdown.php:74
filterbbp_edit_topic_pre_contentwp-markdown.php:75
filteredit_post_contentwp-markdown.php:94
filtercomment_edit_prewp-markdown.php:95
filterbbp_get_form_reply_contentwp-markdown.php:96
filterbbp_get_form_topic_contentwp-markdown.php:97
filtercomment_form_field_commentwp-markdown.php:101
actionbbp_theme_before_reply_form_contentwp-markdown.php:104
actionbbp_theme_after_reply_form_contentwp-markdown.php:105
actionbbp_theme_before_topic_form_contentwp-markdown.php:106
actionbbp_theme_after_topic_form_contentwp-markdown.php:107
actionwp_enqueue_scriptswp-markdown.php:111
filterthe_contentwp-markdown.php:115
filteruser_can_richeditwp-markdown.php:140
actionadmin_enqueue_scriptswp-markdown.php:144
filterbbp_use_wp_editorwp-markdown.php:367
filterbbp_use_wp_editorwp-markdown.php:373
filterbbp_use_wp_editorwp-markdown.php:379
filterbbp_use_wp_editorwp-markdown.php:385
actionadmin_print_footer_scriptswp-markdown.php:494
Maintenance & Trust

WP-Markdown Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedDec 27, 2017
PHP min version
Downloads86K

Community Trust

Rating90/100
Number of ratings28
Active installs400
Developer Profile

WP-Markdown Developer Profile

Stephen Harris

2 plugins · 500 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Markdown

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-markdown/js/markdown.js/wp-content/plugins/wp-markdown/js/prettify.js/wp-content/plugins/wp-markdown/css/markdown.css/wp-content/plugins/wp-markdown/css/prettify.css
Script Paths
/wp-content/plugins/wp-markdown/js/markdown.js/wp-content/plugins/wp-markdown/js/prettify.js
Version Parameters
wp-markdown/js/markdown.js?ver=wp-markdown/js/prettify.js?ver=wp-markdown/css/markdown.css?ver=wp-markdown/css/prettify.css?ver=

HTML / DOM Fingerprints

CSS Classes
markdownbar
FAQ

Frequently Asked Questions about WP-Markdown