WP Tesseract Security & Risk Analysis

wordpress.org/plugins/wp-tesseract

A plugin for extracting text from attached images using OCR via Tesseract.

50 active installs v1.0.2 PHP 7.2+ WP 2.9+ Updated Aug 13, 2020
attachmentsimagesmediaocroptical-text-recognition
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 26, 2025
Safety Verdict

Is WP Tesseract Safe to Use in 2026?

Use With Caution

Score 63/100

WP Tesseract has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 26, 2025Updated 5yr ago
Risk Assessment

The wp-tesseract v1.0.2 plugin presents a mixed security posture. On the positive side, its static analysis shows no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in zero identified entry points and no unprotected ones. Furthermore, all SQL queries appear to be properly prepared, mitigating a common class of vulnerabilities. The absence of external HTTP requests also reduces the risk of server-side request forgery or infection from compromised external resources.

However, significant concerns arise from several code signals. The presence of the 'exec' function is a critical red flag, as it can be exploited for remote code execution if improperly handled. Compounding this, 100% of output escaping is missing, meaning any data processed and displayed by the plugin is vulnerable to Cross-Site Scripting (XSS) attacks. The plugin also performs file operations without clear indication of their security context or sanitization.

The vulnerability history, particularly the existence of one unpatched medium severity CVE related to XSS, reinforces the output escaping concerns. The fact that this vulnerability is recent and unpatched is a major risk. While the attack surface seems limited in terms of direct entry points, the combination of a dangerous function ('exec'), lack of output escaping, and an existing XSS vulnerability, which is a common vulnerability type for this plugin, indicates a substantial risk of compromise.

Key Concerns

  • Unpatched CVE
  • Dangerous function: exec
  • Output escaping: 0% properly escaped
  • Missing Nonce checks
  • Missing Capability checks
Vulnerabilities
1

WP Tesseract Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-60176medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WP Tesseract <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting

Sep 26, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP Tesseract Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

execexec($command, $output, $return);admin\class-wp-tesseract-admin.php:230

Output Escaping

0% escaped3 total outputs
Attack Surface

WP Tesseract Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedincludes\class-wp-tesseract.php:141
actionadmin_enqueue_scriptsincludes\class-wp-tesseract.php:156
actionadmin_enqueue_scriptsincludes\class-wp-tesseract.php:157
actionadmin_menuincludes\class-wp-tesseract.php:160
actionadmin_initincludes\class-wp-tesseract.php:163
actionadd_attachmentincludes\class-wp-tesseract.php:166
actionwp_enqueue_scriptsincludes\class-wp-tesseract.php:180
actionwp_enqueue_scriptsincludes\class-wp-tesseract.php:181
Maintenance & Trust

WP Tesseract Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.0
Last updatedAug 13, 2020
PHP min version7.2
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

WP Tesseract Developer Profile

tattersoftware

1 plugin · 50 total installs

68
trust score
Avg Security Score
63/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Tesseract

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-tesseract/css/wp-tesseract-admin.css/wp-content/plugins/wp-tesseract/js/wp-tesseract-admin.js
Script Paths
/wp-content/plugins/wp-tesseract/js/wp-tesseract-admin.js
Version Parameters
wp-tesseract/css/wp-tesseract-admin.css?ver=wp-tesseract/js/wp-tesseract-admin.js?ver=

HTML / DOM Fingerprints

JS Globals
window.jquery
FAQ

Frequently Asked Questions about WP Tesseract