Archivist Security & Risk Analysis

wordpress.org/plugins/archivist

Gives you a few extra function for the archives widget including limiting the amount of archives to show and wether you want to display yearly, monthl …

20 active installs v1.1 PHP 5.6+ WP 4.3+ Updated Dec 13, 2020
archivesmonthlyweeklywp_get_archivesyearly
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Archivist Safe to Use in 2026?

Generally Safe

Score 85/100

Archivist has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "archivist" plugin v1.1 presents a mixed security posture. From a static analysis perspective, it exhibits strong adherence to secure coding practices in several key areas. The absence of a discernible attack surface, particularly no unprotected AJAX handlers, REST API routes, or shortcodes, significantly limits potential entry points for attackers. Furthermore, all identified SQL queries utilize prepared statements, and there are no indications of dangerous function usage or external HTTP requests. This suggests a conscious effort by the developers to build a secure foundation.

However, a significant concern arises from the low percentage of properly escaped output (19%). This indicates that a substantial portion of user-generated or dynamic content is not being adequately sanitized before being displayed. While taint analysis shows no immediate critical or high severity unsanitized flows, this pervasive lack of output escaping could still lead to cross-site scripting (XSS) vulnerabilities if user input is rendered directly without proper encoding. The vulnerability history is a strong positive, showing no known CVEs, which implies a historically secure plugin. However, this cannot compensate for the identified weakness in output sanitization.

In conclusion, while "archivist" v1.1 demonstrates good practices by minimizing attack surface and securing database interactions, the prevalent issue with output escaping represents a notable security weakness. The lack of known vulnerabilities is encouraging, but the ongoing risk of XSS due to inadequate output sanitization requires attention. The plugin's strengths lie in its limited entry points and secure database handling, but its weakness in output sanitization needs to be addressed to achieve a robust security posture.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

Archivist Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Archivist Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
25
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

19% escaped31 total outputs
Attack Surface

Archivist Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initarchivist.php:165
Maintenance & Trust

Archivist Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedDec 13, 2020
PHP min version5.6
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Archivist Developer Profile

Ben Huson

16 plugins · 21K total installs

90
trust score
Avg Security Score
86/100
Avg Patch Time
2 days
View full developer profile
Detection Fingerprints

How We Detect Archivist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_archive
Data Attributes
id="archivist_archives"id="archivist_archives-title"name="archivist_archives-title"id="archivist_archives-limit"name="archivist_archives-limit"id="archivist_archives-type"+5 more
Shortcode Output
<select name="archive-dropdown" onchange='document.location.href=this.options[this.selectedIndex].value;'><option value="">Select Month</option>
FAQ

Frequently Asked Questions about Archivist