WP-Validate Security & Risk Analysis

wordpress.org/plugins/wp-validator

WP-Validate collects all the pages on your site and runs them through the W3C's HTML Validator.

10 active installs v1.0 PHP + WP 2.5+ Updated Jan 30, 2009
automaticcssvalidationw3cxhtml
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Validate Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Validate has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The static analysis of wp-validator v1.0 reveals a mixed security posture. On the positive side, the plugin exhibits a very small attack surface with no detectable AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the number of potential entry points for attackers. However, the code analysis raises significant concerns. The presence of the `unserialize` function is a major red flag, as it can be exploited for object injection vulnerabilities if the input is not strictly controlled and sanitized. Furthermore, all SQL queries are executed without prepared statements, making the plugin vulnerable to SQL injection attacks. The lack of output escaping means that any data displayed to users could potentially be manipulated to execute malicious code. The absence of nonce and capability checks across any potential entry points (though the attack surface is currently zero) is a worrying oversight that would be problematic if the attack surface were to grow.

Despite these critical code-level weaknesses, the vulnerability history is remarkably clean, with no known CVEs. This might indicate that the plugin is either very new, has not been extensively scrutinized, or that the identified code issues have not yet been exploited in the wild. The current lack of vulnerabilities doesn't negate the inherent risks presented by the static analysis. The plugin's strengths lie in its limited attack surface, but its weaknesses in secure coding practices (unserialize, raw SQL, unescaped output) present substantial risks that require immediate attention to mitigate potential exploits.

Key Concerns

  • Presence of unserialize function
  • SQL queries without prepared statements
  • Output not properly escaped
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP-Validate Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP-Validate Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$posts = unserialize($file);validator.php:41

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

WP-Validate Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuvalidator.php:134
actioninitvalidator.php:135
Maintenance & Trust

WP-Validate Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedJan 30, 2009
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Validate Developer Profile

jamierumbelow

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Validate

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
valid_pagesinvalid_pages
FAQ

Frequently Asked Questions about WP-Validate