WP-SynHighlight Security & Risk Analysis

wordpress.org/plugins/wp-synhighlight

Plugin provides syntax highlighting for about 116 programming languages via Geshi.

100 active installs v2.4.3 PHP + WP 2.8+ Updated Jan 11, 2016
codeformattinghighlightsyntaxsyntax-highlight
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-SynHighlight Safe to Use in 2026?

Generally Safe

Score 85/100

WP-SynHighlight has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The wp-synhighlight v2.4.3 plugin exhibits a mixed security posture. On the positive side, it has no known historical vulnerabilities (CVEs) and no identified critical or high-severity taint flows. The use of prepared statements for all SQL queries is also a strong indicator of good database security practices.

However, several concerns arise from the static analysis. The presence of dangerous functions like `preg_replace(/e)` and `create_function` is a significant red flag, as these are commonly associated with code injection vulnerabilities if not handled with extreme care. Furthermore, the low percentage of properly escaped output (6%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially considering the 49 total output instances.

The lack of nonce checks on the identified entry points (shortcodes) is another critical weakness. While there are only two shortcodes, if they process any user-supplied data without proper nonce verification, they can be exploited for Cross-Site Request Forgery (CSRF) attacks. The capability checks are present, but without knowledge of what these capabilities protect, it's difficult to assess their effectiveness. The absence of AJAX handlers and REST API routes without permission callbacks is positive, but the focus shifts to the identified shortcodes.

Key Concerns

  • Presence of dangerous functions (preg_replace(/e), create_function)
  • Low percentage of properly escaped output
  • Missing nonce checks on entry points (shortcodes)
  • Bundled library (TinyMCE) not analyzed for version
Vulnerabilities
None known

WP-SynHighlight Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP-SynHighlight Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

WP-SynHighlight Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
46
3 escaped
Nonce Checks
0
Capability Checks
2
File Operations
12
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

preg_replace(/e)preg_replace("/(t\.scripts_to_load=\s*)\[([^\]]*)\];/e"edit_area\edit_area_compressor.php:146
preg_replace(/e)preg_replace("/(t\.sub_scripts_to_load=\s*)\[([^\]]*)\];/e"edit_area\edit_area_compressor.php:150
create_function$callback_2 = create_function('$matches', 'return "[" . str_replace("|", "", $matches[1]) . "]";');geshi\geshi.php:4605

Bundled Libraries

TinyMCE

Output Escaping

6% escaped49 total outputs
Attack Surface

WP-SynHighlight Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[codesyntax] wp-synhighlighter.php:47
[filesyntax] wp-synhighlighter.php:48
WordPress Hooks 12
filtercomment_textmodules\comments.php:9
actionadmin_noticesmodules\on_install.php:52
actionadmin_noticesmodules\on_install.php:58
filtermce_external_pluginsmodules\richeditor.php:9
filtermce_buttonsmodules\richeditor.php:10
filtertiny_mce_versionmodules\richeditor.php:11
filterno_texturize_shortcodeswp-synhighlighter.php:50
filterthe_postswp-synhighlighter.php:55
actioninitwp-synhighlighter.php:61
actionwp_headwp-synhighlighter.php:65
actioninitwp-synhighlighter.php:77
actionadmin_menuwp-synhighlighter.php:80
Maintenance & Trust

WP-SynHighlight Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 11, 2016
PHP min version
Downloads33K

Community Trust

Rating92/100
Number of ratings5
Active installs100
Developer Profile

WP-SynHighlight Developer Profile

FractalizeR

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-SynHighlight

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-synhighlight/themes/default/geshi/abap.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/bash.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/c.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/csharp.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/css.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/delphi.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/html.css/wp-content/plugins/wp-synhighlight/themes/default/geshi/java.css+9 more
Script Paths
/wp-content/plugins/wp-synhighlight/modules/highlighter.php/wp-content/plugins/wp-synhighlight/modules/post_parser.php/wp-content/plugins/wp-synhighlight/modules/on_install.php/wp-content/plugins/wp-synhighlight/modules/styles.php/wp-content/plugins/wp-synhighlight/modules/comments.php/wp-content/plugins/wp-synhighlight/modules/richeditor.php+1 more

HTML / DOM Fingerprints

Shortcode Output
[codesyntax][filesyntax]
FAQ

Frequently Asked Questions about WP-SynHighlight