Archive Security & Risk Analysis

wordpress.org/plugins/archive

Archive your post types, also possible with cron and list via shortcode on frontend.

100 active installs v1.0.2 PHP + WP 3.0+ Updated May 4, 2020
archivecustom-post-typepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Archive Safe to Use in 2026?

Generally Safe

Score 85/100

Archive has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "archive" plugin v1.0.2 demonstrates a generally positive security posture due to the absence of known vulnerabilities and a small attack surface. The static analysis reveals no critical issues like dangerous functions or external HTTP requests. However, there are several areas for improvement. The plugin's sole shortcode and cron event present entry points, and while they have capability checks, the lack of nonce checks on potential AJAX interactions (though none are reported) or direct user input handling for the shortcode could be a concern if not properly validated server-side.

A significant concern arises from the SQL query usage; 100% of the queries are not using prepared statements. This is a high-risk practice that makes the plugin highly susceptible to SQL injection vulnerabilities, especially if the data used in these queries originates from user input. Furthermore, the taint analysis indicates flows with unsanitized paths, suggesting potential for path traversal vulnerabilities, although no critical or high severity issues were found in this regard. The lack of output escaping on all identified outputs is another weakness that could lead to cross-site scripting (XSS) vulnerabilities.

While the vulnerability history is clean, indicating good development practices to date or a lack of significant testing, it should not be relied upon as the sole measure of security. The current code analysis highlights specific, actionable risks that need to be addressed. The plugin's strengths lie in its limited attack surface and lack of known CVEs, but its weaknesses in SQL query security, output escaping, and potential unsanitized path flows require immediate attention to bolster its overall security.

Key Concerns

  • SQL queries not using prepared statements
  • Outputs not properly escaped
  • Flows with unsanitized paths
Vulnerabilities
None known

Archive Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Archive Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped4 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
archive_post_type (archive.php:652)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Archive Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[archive] archive.php:200
WordPress Hooks 19
actionplugins_loadedarchive.php:27
actioninitarchive.php:176
actioninitarchive.php:179
actionscheduled_archivingarchive.php:181
actionadmin_initarchive.php:184
actionadmin_initarchive.php:187
actionadmin_menuarchive.php:188
actionadmin_enqueue_scriptsarchive.php:190
actioncontextual_helparchive.php:193
actionpre_get_postsarchive.php:197
filterpost_row_actionsarchive.php:379
filterpage_row_actionsarchive.php:380
actionadmin_action_archivearchive.php:381
actionadmin_noticesarchive.php:382
filterpost_row_actionsarchive.php:386
actionadmin_action_unset_archivearchive.php:387
actionadd_meta_boxesarchive.php:391
actionadmin_head-edit.phparchive.php:393
filtermanage_posts_custom_columnarchive.php:1142

Scheduled Events 1

scheduled_archiving
Maintenance & Trust

Archive Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 4, 2020
PHP min version
Downloads16K

Community Trust

Rating46/100
Number of ratings3
Active installs100
Developer Profile

Archive Developer Profile

Frank Bueltge

5 plugins · 101K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Archive

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/archive/css/archive.css/wp-content/plugins/archive/js/archive.js
Script Paths
/wp-content/plugins/archive/js/archive.js
Version Parameters
archive/style.css?ver=archive.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-archive-iddata-archive-post-type
JS Globals
archive
Shortcode Output
<div class="archive-list"></div>
FAQ

Frequently Asked Questions about Archive