Admin Taxonomy Filter Security & Risk Analysis

wordpress.org/plugins/admin-taxonomy-filter

Filter posts or custom post types in the admin area by custom taxonomies.

5K active installs v1.0.5 PHP + WP 4.3+ Updated Oct 6, 2025
adminpost-filterpost-listtaxonomytaxonomy-filter
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin Taxonomy Filter Safe to Use in 2026?

Generally Safe

Score 100/100

Admin Taxonomy Filter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "admin-taxonomy-filter" v1.0.5 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, unescaped output, file operations, external HTTP requests, or vulnerabilities in SQL queries (all using prepared statements) indicates robust coding practices. The zero-count for AJAX handlers, REST API routes, shortcodes, and cron events with or without authentication checks suggests a minimal attack surface and a lack of direct entry points that could be exploited. Furthermore, the plugin has no recorded vulnerability history, further bolstering its security reputation.

While the static analysis and vulnerability history paint a reassuring picture, the complete absence of taint analysis flows and nonce/capability checks across all entry points is a point of consideration. This might indicate a lack of complex data processing or that the plugin's functionality is very limited and doesn't involve user-supplied data that could be manipulated. However, in the absence of specific data to the contrary, the plugin appears to be well-secured. The strengths lie in its clean code and lack of known issues, with the only potential area for scrutiny being the lack of explicit security checks where they might be expected in more complex plugins.

In conclusion, "admin-taxonomy-filter" v1.0.5 appears to be a secure plugin. Its strengths are evident in the static analysis results showing no dangerous functions, proper SQL handling, and no known vulnerabilities. The limited attack surface is also a positive factor. The lack of detailed taint analysis and explicit security checks on potential entry points are areas that, while not immediately indicative of a vulnerability given the other data, might warrant further investigation if the plugin were to introduce more complex functionality in the future. For its current reported state, the risk is low.

Vulnerabilities
None known

Admin Taxonomy Filter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Admin Taxonomy Filter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

Admin Taxonomy Filter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionrestrict_manage_postsinc\controller.php:9
actionadmin_menuinc\settings.php:4
actionadmin_initinc\settings.php:5
Maintenance & Trust

Admin Taxonomy Filter Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 6, 2025
PHP min version
Downloads56K

Community Trust

Rating90/100
Number of ratings14
Active installs5K
Developer Profile

Admin Taxonomy Filter Developer Profile

Anh Tran

17 plugins · 85K total installs

85
trust score
Avg Security Score
96/100
Avg Patch Time
76 days
View full developer profile
Detection Fingerprints

How We Detect Admin Taxonomy Filter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/admin-taxonomy-filter/admin-taxonomy-filter.php

HTML / DOM Fingerprints

CSS Classes
admin-taxonomy-filter
FAQ

Frequently Asked Questions about Admin Taxonomy Filter