After Content Security & Risk Analysis

wordpress.org/plugins/after-content

Adds post pagination, related content, author info, social sharing buttons, post meta, text, image and banner after posts content.

10 active installs v1.5 PHP + WP 3.0+ Updated Mar 7, 2014
author-biographyauthor-infopost-metapost-paginationrelated-content
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is After Content Safe to Use in 2026?

Generally Safe

Score 85/100

After Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "after-content" plugin v1.5 exhibits a generally strong security posture with no known historical vulnerabilities. The static analysis reveals a limited attack surface, with only one AJAX handler identified and no REST API routes, shortcodes, or cron events that appear to be publicly accessible or unprotected. The plugin demonstrates good practices by utilizing nonces and capability checks on its entry points, and a majority of its SQL queries use prepared statements.

However, there are several areas of concern. The taint analysis indicates "flows with unsanitized paths," which, while not classified as critical or high severity in this instance, points to a potential for path traversal vulnerabilities if not properly handled. Furthermore, the plugin has a significantly low rate of proper output escaping (only 12%), which is a major red flag. This means that user-supplied data displayed on the frontend could be vulnerable to Cross-Site Scripting (XSS) attacks.

While the vulnerability history is clean, the code analysis reveals weaknesses that, if exploited, could lead to security issues. The low rate of output escaping, in particular, represents a substantial risk that needs immediate attention. In conclusion, the plugin has strengths in its limited attack surface and use of basic security checks, but the significant lack of output escaping and the presence of unsanitized paths are considerable weaknesses that lower its overall security score.

Key Concerns

  • Low output escaping rate
  • Unsanitized paths in taint flows
Vulnerabilities
None known

After Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

After Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
328
44 escaped
Nonce Checks
1
Capability Checks
3
File Operations
2
External Requests
4
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

12% escaped372 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
_admin_notices (ReduxFramework\ReduxCore\framework.php:468)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

After Content Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_redux_allow_trackingReduxFramework\ReduxCore\inc\tracking.php:267
WordPress Hooks 27
filterthe_contentafter-content.php:59
actionwp_enqueue_scriptsafter-content.php:95
actionwp_enqueue_scriptsafter-content.php:102
actionwp_enqueue_scriptsafter-content.php:109
actionwp_enqueue_scriptsafter-content.php:116
actionwp_enqueue_scriptsafter-content.php:125
actionwp_enqueue_scriptsafter-content.php:131
actionwp_enqueue_scriptsafter-content.php:138
actionplugins_loadedinc\plugin-options.php:20
filteruser_contactmethodsinc\social-profiles.php:25
actionadmin_enqueue_scriptsReduxFramework\ReduxCore\extensions\customizer\extension_customizer.php:85
actioncustomize_registerReduxFramework\ReduxCore\extensions\customizer\extension_customizer.php:87
actionload_textdomainReduxFramework\ReduxCore\extensions\customizer\extension_customizer.php:93
actionadmin_menuReduxFramework\ReduxCore\framework.php:420
actionadmin_bar_menuReduxFramework\ReduxCore\framework.php:423
actionadmin_initReduxFramework\ReduxCore\framework.php:426
actionadmin_noticesReduxFramework\ReduxCore\framework.php:429
actionadmin_initReduxFramework\ReduxCore\framework.php:432
actionadmin_enqueue_scriptsReduxFramework\ReduxCore\framework.php:436
actionwp_headReduxFramework\ReduxCore\framework.php:440
actionadmin_headReduxFramework\ReduxCore\framework.php:1780
filteradmin_footer_textReduxFramework\ReduxCore\framework.php:1783
filterredux/font-iconsReduxFramework\ReduxCore\inc\fields\select\elusive-icons.php:309
actionadmin_enqueue_scriptsReduxFramework\ReduxCore\inc\tracking.php:34
actionredux_trackingReduxFramework\ReduxCore\inc\tracking.php:42
actionadmin_print_footer_scriptsReduxFramework\ReduxCore\inc\tracking.php:53
filterredux/tracking/optionsReduxFramework\ReduxCore\inc\tracking.php:247

Scheduled Events 1

redux_tracking
Maintenance & Trust

After Content Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 7, 2014
PHP min version
Downloads3K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

After Content Developer Profile

laura20

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect After Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/after-content/after-content.css
Script Paths
/wp-content/plugins/after-content/js/facebook.js/wp-content/plugins/after-content/js/twitter.js/wp-content/plugins/after-content/js/google-plus.js
Version Parameters
after-content.css?ver=1.5

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about After Content