WP Search Auto Match Security & Risk Analysis

wordpress.org/plugins/wp-search-auto-match

Add Search Keywork Hint like Google Search to your blog's search form.

10 active installs v1.1 PHP + WP 3.0+ Updated Mar 10, 2014
matchsearchsearch-form
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Search Auto Match Safe to Use in 2026?

Generally Safe

Score 85/100

WP Search Auto Match has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of wp-search-auto-match v1.1 reveals a plugin with a seemingly small attack surface, reporting zero AJAX handlers, REST API routes, shortcodes, or cron events. This, combined with the absence of dangerous functions, file operations, external HTTP requests, and bundled libraries, initially suggests a relatively secure codebase. Furthermore, all SQL queries are prepared, which is a significant security strength. However, the analysis also flags critical areas of concern. Notably, none of the identified output operations are properly escaped, meaning sensitive data could be exposed to cross-site scripting (XSS) attacks. Taint analysis shows two flows with unsanitized paths, indicating potential for data manipulation or execution if these paths are exposed. The lack of nonce checks and capability checks for any potential entry points, combined with the unescaped outputs, presents a significant risk of unauthorized actions or data leakage. The complete absence of recorded vulnerabilities is positive but does not negate the risks identified within the current code analysis, as unpatched issues could exist or emerge from the identified unescaped outputs and unsanitized paths.

Key Concerns

  • Unescaped output detected
  • Unsanitized paths in taint analysis
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Search Auto Match Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Search Auto Match Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wp_search_auto_match_tag_cloud (wp-search-auto-match.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Search Auto Match Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitwp-search-auto-match.php:50
actionwp_enqueue_scriptswp-search-auto-match.php:55
actionwp_enqueue_scriptswp-search-auto-match.php:61
Maintenance & Trust

WP Search Auto Match Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 10, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP Search Auto Match Developer Profile

Arefly

24 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Search Auto Match

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-search-auto-match/style.min.css/wp-content/plugins/wp-search-auto-match/js/wp-search-auto-match-init.min.js
Script Paths
/wp-content/plugins/wp-search-auto-match/js/wp-search-auto-match-init.min.js

HTML / DOM Fingerprints

JS Globals
wp_search_auto_match_info
FAQ

Frequently Asked Questions about WP Search Auto Match