Advanced Custom Post Search Security & Risk Analysis

wordpress.org/plugins/advanced-custom-post-search

A useful plugin for creating search forms & results pages for custom post types & taxonomies.

200 active installs v1.2.4 PHP + WP 3.0.0+ Updated Jul 30, 2014
custom-post-typeformsearchtaxonomiestaxonomy-filter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Advanced Custom Post Search Safe to Use in 2026?

Generally Safe

Score 85/100

Advanced Custom Post Search has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "advanced-custom-post-search" plugin v1.2.4 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and not making external HTTP requests or performing file operations. The absence of known CVEs and bundled libraries is also a strength. However, several significant concerns are present. The plugin has a notable attack surface with one AJAX handler lacking authentication checks. The presence of the `unserialize` function is a red flag, as it can lead to object injection vulnerabilities if not handled with extreme care. Furthermore, only a small percentage of output is properly escaped, indicating a risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis shows a flow with unsanitized paths, which, while not classified as critical or high in this specific instance, still points to potential security weaknesses.

Key Concerns

  • AJAX handler without authentication
  • Dangerous function: unserialize used
  • Low output escaping percentage
  • Taint flow with unsanitized paths
Vulnerabilities
None known

Advanced Custom Post Search Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Advanced Custom Post Search Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
38
3 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize@unserialize($v[0])!=false ? $acps_fields[$k] = unserialize($v[0]) : $acps_fields[$k] = $v[0];acps.php:237
unserialize@unserialize($v[0])!=false ? $acps_fields[$k] = unserialize($v[0]) : $acps_fields[$k] = $v[0];acps.php:237

Output Escaping

7% escaped41 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
process_acps_label_ajax (core\controllers\search_form.php:259)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Advanced Custom Post Search Attack Surface

Entry Points5
Unprotected1

AJAX Handlers 3

authwp_ajax_acps_get_resultscore\controllers\search_form.php:15
authwp_ajax_acps_get_label_fieldscore\controllers\search_form.php:16
authwp_ajax_acps_get_keyword_fieldcore\controllers\search_form.php:17

Shortcodes 2

[acps] core\shortcodes\acps_shortcodes.php:10
[acps_results] core\shortcodes\acps_shortcodes.php:13
WordPress Hooks 20
filteracps/helpers/get_pathacps.php:42
filteracps/helpers/get_diracps.php:43
actioninitacps.php:59
actionacps/save_postacps.php:60
actiontemplate_redirectacps.php:61
filteracps/get_settingsacps.php:64
filteracps/get_meta_dataacps.php:65
actionadmin_menuacps.php:71
actionadmin_headacps.php:74
filterpost_updated_messagesacps.php:156
filterbody_classcore\acps_core_functions.php:71
actionadmin_enqueue_scriptscore\controllers\acps_settings_page.php:16
actionadmin_menucore\controllers\acps_settings_page.php:17
actionadmin_initcore\controllers\acps_settings_page.php:18
actionadmin_enqueue_scriptscore\controllers\search_form.php:9
actionsave_postcore\controllers\search_form.php:12
actionadmin_headcore\controllers\search_form.php:24
actionadmin_menucore\controllers\search_forms.php:9
actionadmin_footercore\controllers\search_forms.php:10
actionwidgets_initcore\widgets\acps_widgets.php:359
Maintenance & Trust

Advanced Custom Post Search Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJul 30, 2014
PHP min version
Downloads23K

Community Trust

Rating76/100
Number of ratings13
Active installs200
Developer Profile

Advanced Custom Post Search Developer Profile

Creare

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Custom Post Search

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advanced-custom-post-search/css/acps-admin.css/wp-content/plugins/advanced-custom-post-search/css/acps-frontend.css/wp-content/plugins/advanced-custom-post-search/css/chzn.css/wp-content/plugins/advanced-custom-post-search/js/admin-ajax.js/wp-content/plugins/advanced-custom-post-search/js/chzn.js
Script Paths
/wp-content/plugins/advanced-custom-post-search/js/admin-ajax.js/wp-content/plugins/advanced-custom-post-search/js/chzn.js
Version Parameters
advanced-custom-post-search/css/acps-admin.css?ver=advanced-custom-post-search/css/acps-frontend.css?ver=advanced-custom-post-search/css/chzn.css?ver=advanced-custom-post-search/js/admin-ajax.js?ver=advanced-custom-post-search/js/chzn.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-acps-search-id
FAQ

Frequently Asked Questions about Advanced Custom Post Search