WP-Spellcheck Security & Risk Analysis

wordpress.org/plugins/wp-spellcheck

TinyMCE SpellChecker API - this plugin provides action/filter hooks to allow easy customisation of the TinyMCE SpellChecker.

60 active installs v1.0 PHP + WP 2.8+ Updated May 29, 2009
proxyspellchecktinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Spellcheck Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Spellcheck has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "wp-spellcheck" v1.0 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by avoiding dangerous functions, performing 100% of its SQL queries using prepared statements, and ensuring all outputs are properly escaped. There are no recorded vulnerabilities (CVEs) or recorded taint flows, suggesting a lack of historically exploitable issues and a generally clean codebase in terms of data sanitization. The absence of file operations and external HTTP requests also reduces potential attack vectors.

However, a significant concern arises from the presence of one AJAX handler that lacks authentication checks. This represents a direct entry point into the plugin's functionality that can be accessed by unauthenticated users. While the static analysis did not reveal any specific dangerous functions or taint issues that could be exploited through this AJAX handler, the lack of authorization leaves it vulnerable to potential abuse. The absence of any nonce checks on this AJAX handler further exacerbates this risk, as it provides no mechanism to verify the legitimacy of the request.

In conclusion, the plugin's strengths lie in its secure coding practices for SQL and output handling, and its clean vulnerability history. The primary weakness is the unprotected AJAX endpoint, which, despite not having immediate exploitable flaws identified in static analysis, presents a clear security oversight. Addressing the authentication for this AJAX handler is crucial to improving the plugin's overall security.

Key Concerns

  • Unprotected AJAX handler
  • Missing nonce check on AJAX handler
Vulnerabilities
None known

WP-Spellcheck Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Spellcheck Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
1 unprotected

WP-Spellcheck Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_spellcheckwp-spellcheck.php:18
WordPress Hooks 3
filtertiny_mce_before_initwp-spellcheck.php:19
filterwp_spellcheck_engine_configwp-spellcheck.php:20
actionwp_spellcheck_rpc_resultwp_spellcheck_exceptions.php:11
Maintenance & Trust

WP-Spellcheck Maintenance & Trust

Maintenance Signals

WordPress version tested2.8
Last updatedMay 29, 2009
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

WP-Spellcheck Developer Profile

Ben

2 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Spellcheck

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
admin-ajax.php?action=spellcheck
FAQ

Frequently Asked Questions about WP-Spellcheck