
Archivist Security & Risk Analysis
wordpress.org/plugins/archivistGives you a few extra function for the archives widget including limiting the amount of archives to show and wether you want to display yearly, monthl …
Is Archivist Safe to Use in 2026?
Generally Safe
Score 85/100Archivist has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "archivist" plugin v1.1 presents a mixed security posture. From a static analysis perspective, it exhibits strong adherence to secure coding practices in several key areas. The absence of a discernible attack surface, particularly no unprotected AJAX handlers, REST API routes, or shortcodes, significantly limits potential entry points for attackers. Furthermore, all identified SQL queries utilize prepared statements, and there are no indications of dangerous function usage or external HTTP requests. This suggests a conscious effort by the developers to build a secure foundation.
However, a significant concern arises from the low percentage of properly escaped output (19%). This indicates that a substantial portion of user-generated or dynamic content is not being adequately sanitized before being displayed. While taint analysis shows no immediate critical or high severity unsanitized flows, this pervasive lack of output escaping could still lead to cross-site scripting (XSS) vulnerabilities if user input is rendered directly without proper encoding. The vulnerability history is a strong positive, showing no known CVEs, which implies a historically secure plugin. However, this cannot compensate for the identified weakness in output sanitization.
In conclusion, while "archivist" v1.1 demonstrates good practices by minimizing attack surface and securing database interactions, the prevalent issue with output escaping represents a notable security weakness. The lack of known vulnerabilities is encouraging, but the ongoing risk of XSS due to inadequate output sanitization requires attention. The plugin's strengths lie in its limited entry points and secure database handling, but its weakness in output sanitization needs to be addressed to achieve a robust security posture.
Key Concerns
- Low output escaping percentage
Archivist Security Vulnerabilities
Archivist Code Analysis
Output Escaping
Archivist Attack Surface
WordPress Hooks 1
Maintenance & Trust
Archivist Maintenance & Trust
Maintenance Signals
Community Trust
Archivist Alternatives
Compact Archives
compact-archives
Displays a smart monthly archive of posts in a more compact form rather than the default long archive widget.
Spice Archive Page
spice-archive-page
Plugin allows you to display yearly, monthly and daily archives in pages.
Category Archives Block
category-archives-block
Displays a monthly or yearly archive of posts for one or more specific categories.
AW WordPress Yearly Category Archives
aw-yearly-category-archives
This plugin will allow for yearly archives of specific categories from all post types and "Posts".
Date Pagination
date-pagination
Paginate your posts by year, month or day.
Archivist Developer Profile
16 plugins · 21K total installs
How We Detect Archivist
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
widget_archiveid="archivist_archives"id="archivist_archives-title"name="archivist_archives-title"id="archivist_archives-limit"name="archivist_archives-limit"id="archivist_archives-type"+5 more<select name="archive-dropdown" onchange='document.location.href=this.options[this.selectedIndex].value;'><option value="">Select Month</option>