Plotly Security & Risk Analysis

wordpress.org/plugins/wp-plotly

Embed Plotly graphs in wordpress admin.

100 active installs v1.0.2 PHP + WP 3.0.1+ Updated Jul 10, 2015
embedgraphgraphsplot-lyplotly
84
B · Generally Safe
CVEs total2
Unpatched0
Last CVEJul 13, 2015
Safety Verdict

Is Plotly Safe to Use in 2026?

Mostly Safe

Score 84/100

Plotly is generally safe to use though it hasn't been updated recently. 2 past CVEs were resolved. Keep it updated.

2 known CVEsLast CVE: Jul 13, 2015Updated 10yr ago
Risk Assessment

The wp-plotly plugin v1.0.2 exhibits a generally strong security posture based on the static analysis. The absence of direct entry points such as AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate a commendable commitment to security best practices, with no dangerous functions identified, all SQL queries utilizing prepared statements, and all outputs being properly escaped. The absence of file operations and external HTTP requests further reduces potential vectors for compromise. However, a significant concern arises from the plugin's vulnerability history. The presence of two known medium-severity CVEs, both related to Cross-Site Scripting (XSS), and the fact that the last vulnerability was in 2015 suggests a potential for unaddressed security flaws. While no vulnerabilities are currently unpatched, the historical pattern indicates a past susceptibility to XSS, which could be a latent risk if not thoroughly remediated in newer, unanalyzed versions.

In conclusion, while the static analysis of v1.0.2 demonstrates good coding practices and a minimal attack surface, the historical vulnerability data presents a notable weakness. The plugin's past struggles with XSS, even if resolved in later versions, warrant cautious consideration. A comprehensive security assessment would require analyzing more recent versions to confirm the permanent resolution of these past issues and to identify any new potential vulnerabilities.

Key Concerns

  • Past unpatched medium CVEs
  • History of XSS vulnerabilities
Vulnerabilities
2

Plotly Security Vulnerabilities

CVEs by Year

2 CVEs in 2015
2015
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2015-9347medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Plotly <= 1.0.2 - Stored Cross-Site Scripting

Jul 13, 2015 Patched in 1.0.3 (3116d)
CVE-2015-5484medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Plotly < 1.0.3 - Stored Cross-Site Scripting

Jul 13, 2015 Patched in 1.0.3 (3116d)
Code Analysis
Analyzed Mar 16, 2026

Plotly Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Plotly Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninittrunk\wp-plotly.php:14
actioninitwp-plotly.php:14
Maintenance & Trust

Plotly Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedJul 10, 2015
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Plotly Developer Profile

andrefarzat

1 plugin · 100 total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
3116 days
View full developer profile
Detection Fingerprints

How We Detect Plotly

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://plot.ly/embed.js

HTML / DOM Fingerprints

Data Attributes
data-plotly
Shortcode Output
<div><a href='https://plot.ly/~
FAQ

Frequently Asked Questions about Plotly