xLanguage Security & Risk Analysis

wordpress.org/plugins/xlanguage

Allows you to blog in multi-language, and users to select which to read. Works on every blog UI elements, not just the post.

100 active installs v2.0.4 PHP + WP 2.3.2+ Updated Jun 9, 2009
babell10nlanguagemultilanguagemultilingual
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is xLanguage Safe to Use in 2026?

Generally Safe

Score 85/100

xLanguage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The plugin "xlanguage" v2.0.4 exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) in its history, suggesting a generally stable and secure codebase or a lack of extensive security auditing. Furthermore, all SQL queries utilize prepared statements, and there are a reasonable number of nonce and capability checks, indicating some awareness of security best practices. However, significant concerns arise from the static code analysis. The presence of the `create_function` dangerous function is a major red flag, as it can lead to code injection vulnerabilities if used with user-supplied input. Additionally, a very low percentage of output is properly escaped (3%), implying a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals that 8 out of 9 analyzed flows have unsanitized paths, which is a critical indicator of potential security flaws, even though no critical or high severity issues were explicitly flagged in the taint results themselves. The combination of these factors, particularly the high rate of unsanitized paths and poor output escaping, presents a substantial risk despite the clean vulnerability history.

Key Concerns

  • Dangerous function used (create_function)
  • Very low output escaping percentage
  • High number of unsanitized paths in taint analysis
  • Bundled outdated library (TinyMCE v2.0)
Vulnerabilities
None known

xLanguage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

xLanguage Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
3 prepared
Unescaped Output
144
4 escaped
Nonce Checks
9
Capability Checks
2
File Operations
8
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

create_functionvar xlanguage_language = [ <?php echo implode(',', array_map( create_function('$v', 'return "\'${v[\view\admin\head_post.php:5

Bundled Libraries

TinyMCE2.0

SQL Query Safety

100% prepared3 total queries

Output Escaping

3% escaped148 total outputs
Data Flows
8 unsanitized

Data Flow Analysis

9 flows8 with unsanitized paths
admin_screen_parserlog_file (admin.php:936)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

xLanguage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionadmin_headadmin.php:122
actionadmin_headadmin.php:145
filteradmin_menuadmin.php:148
filtercontextual_helpadmin.php:149
actionsave_postadmin.php:174
actioninitplugin.php:130
actionwidgets_initplugin.php:518
actionsidebar_admin_setupplugin.php:544
actionsidebar_admin_pageplugin.php:545
actionplugins_loadedxlanguage.php:165
filterrewrite_rules_arrayxlanguage.php:168
filtermce_pluginsxlanguage.php:208
filtermce_external_pluginsxlanguage.php:209
filtermce_buttonsxlanguage.php:210
filtermce_cssxlanguage.php:211
actionparse_requestxlanguage.php:218
filterquery_varsxlanguage.php:219
actionget_pagesxlanguage.php:221
filterposts_joinxlanguage.php:222
filterposts_wherexlanguage.php:223
filtertemplatexlanguage.php:244
filterstylesheetxlanguage.php:245
actionplugins_loadedxlanguage.php:1398
Maintenance & Trust

xLanguage Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedJun 9, 2009
PHP min version
Downloads79K

Community Trust

Rating80/100
Number of ratings2
Active installs100
Developer Profile

xLanguage Developer Profile

sam0737

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect xLanguage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/xlanguage/admin/css/xlanguage.css/wp-content/plugins/xlanguage/admin/css/jquery.css/wp-content/plugins/xlanguage/admin/js/jquery.js/wp-content/plugins/xlanguage/admin/js/xlanguage.js/wp-content/plugins/xlanguage/js/xlanguage.js/wp-content/plugins/xlanguage/widget.php
Script Paths
/wp-content/plugins/xlanguage/admin/js/xlanguage.js/wp-content/plugins/xlanguage/js/xlanguage.js
Version Parameters
xlanguage/admin/css/xlanguage.css?ver=xlanguage/admin/css/jquery.css?ver=xlanguage/admin/js/jquery.js?ver=xlanguage/admin/js/xlanguage.js?ver=xlanguage/js/xlanguage.js?ver=

HTML / DOM Fingerprints

CSS Classes
xlanguage_options
HTML Comments
This program is free software: you can redistribute it and/or modify it under the terms of the GNU GeneralThis software is provided "as is" and any express or implied warranties, including, but not limited to,For full license details see license.txt
JS Globals
xLanguage
FAQ

Frequently Asked Questions about xLanguage