Advanced Category Excluder Security & Risk Analysis

wordpress.org/plugins/advanced-category-excluder

The No.1 content separator, content manager, content excluder, sidebar widget manager plugin to enable CMS like functionality.

700 active installs v1.4.5 PHP + WP 3.0+ Updated Sep 18, 2013
categoriesfeedpostrsssearch
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advanced Category Excluder Safe to Use in 2026?

Generally Safe

Score 85/100

Advanced Category Excluder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "advanced-category-excluder" plugin, version 1.4.5, presents a generally strong security posture with no recorded vulnerabilities and a clean taint analysis. The absence of dangerous functions, file operations, and external HTTP requests further bolsters its security. The plugin also demonstrates good practices by including a substantial number of nonce checks.

However, several areas warrant attention. The most significant concern is the low percentage of SQL queries utilizing prepared statements (25%), indicating a potential risk for SQL injection vulnerabilities if these unprotected queries handle user-supplied data. Additionally, a very low percentage of output escaping (11%) is a critical weakness, leaving the plugin susceptible to cross-site scripting (XSS) attacks, especially if any user input is directly reflected in the output. The complete lack of capability checks, while balanced by a seemingly small attack surface in this static analysis, could become a risk if the plugin's functionality were to expand or if certain entry points were missed in the analysis.

While the plugin has no historical vulnerabilities, the identified code signals for SQL and output handling are fundamental security flaws that can exist without being exploited or documented. The plugin's strengths lie in its lack of known exploits and its use of nonces, but the critical issues in SQL query sanitization and output escaping represent significant and actionable security risks.

Key Concerns

  • Low percentage of prepared statements for SQL
  • Very low percentage of properly escaped output
  • No capability checks for entry points
Vulnerabilities
None known

Advanced Category Excluder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Advanced Category Excluder Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
2 prepared
Unescaped Output
73
9 escaped
Nonce Checks
11
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

25% prepared8 total queries

Output Escaping

11% escaped82 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<main> (main.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Advanced Category Excluder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
actionadmin_noticesadvanced-category-excluder.php:28
filterposts_joinadvanced-category-excluder.php:492
filterposts_whereadvanced-category-excluder.php:493
filterposts_distinctadvanced-category-excluder.php:494
filterget_termsadvanced-category-excluder.php:496
filtergetarchives_whereadvanced-category-excluder.php:499
filterwp_list_pages_excludesadvanced-category-excluder.php:501
filterget_bookmarksadvanced-category-excluder.php:502
actionadmin_menuadvanced-category-excluder.php:504
actionadmin_headadvanced-category-excluder.php:505
actioninitadvanced-category-excluder.php:506
actionwp_headadvanced-category-excluder.php:508
actionactivate_advanced-category-excluder/advanced-category-excluder.phpadvanced-category-excluder.php:510
actiondeactivate_advanced-category-excluder/advanced-category-excluder.phpadvanced-category-excluder.php:511
actionwidgets_initwidgets\calendar.php:313
actionwidgets_initwidgets\categories.php:182
actionwidgets_initwidgets\recent-comments.php:275
actionwidgets_initwidgets\recent-posts.php:241
Maintenance & Trust

Advanced Category Excluder Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 18, 2013
PHP min version
Downloads302K

Community Trust

Rating66/100
Number of ratings16
Active installs700
Developer Profile

Advanced Category Excluder Developer Profile

DjZoNe

5 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Category Excluder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advanced-category-excluder/ace-admin.css/wp-content/plugins/advanced-category-excluder/ace-admin.js/wp-content/plugins/advanced-category-excluder/ace-front.css
Script Paths
/wp-content/plugins/advanced-category-excluder/ace-admin.js
Version Parameters
advanced-category-excluder/ace-admin.css?ver=advanced-category-excluder/ace-admin.js?ver=advanced-category-excluder/ace-front.css?ver=

HTML / DOM Fingerprints

CSS Classes
ace-settings-onlyinwidgetace-categories-is-home
HTML Comments
<!-- ACE plugin -->
Data Attributes
ace_page_main
JS Globals
ace_settings_onlyinwidgetace_categories_is_homeace_link_sections_filterace_linkcategory_sections_filterace_page_sections_filterace_categories_filter
FAQ

Frequently Asked Questions about Advanced Category Excluder