Ascending Posts by Fly Plugins Security & Risk Analysis

wordpress.org/plugins/ascending-posts

This plugin adds a feature to a post category to allow the posts in that particular category to be displayed in ascending or descending order by date.

500 active installs v1.6 PHP + WP 4.8+ Updated Nov 16, 2024
ascending-postsdescending-postsorder-posts
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ascending Posts by Fly Plugins Safe to Use in 2026?

Generally Safe

Score 92/100

Ascending Posts by Fly Plugins has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the 'ascending-posts' v1.6 plugin reveals a generally positive security posture, with no identified critical or high-risk vulnerabilities in the code signals or taint analysis. The absence of dangerous functions, external HTTP requests, file operations, and SQL queries that don't use prepared statements are strong indicators of good security practices. Furthermore, the plugin boasts a clean vulnerability history with no recorded CVEs, suggesting a history of stable and secure development.

However, there are areas for improvement. The most significant concern is the low percentage of properly escaped output (33%). This indicates that user-supplied data might be outputted without sufficient sanitization, potentially leading to cross-site scripting (XSS) vulnerabilities. The absence of nonce and capability checks on any entry points, while currently not an issue due to zero identified entry points, represents a latent risk if functionality is added in the future without proper security considerations.

In conclusion, 'ascending-posts' v1.6 appears to be a secure plugin at present, with a strong foundation of secure coding practices and a clean vulnerability record. The primary weakness lies in the insufficient output escaping, which should be addressed to mitigate potential XSS risks. The lack of security checks on potential future entry points is a minor concern, but one that developers should be mindful of as the plugin evolves.

Key Concerns

  • Insufficient output escaping (33% proper)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Ascending Posts by Fly Plugins Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ascending Posts by Fly Plugins Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped9 total outputs
Attack Surface

Ascending Posts by Fly Plugins Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuascendingposts.php:144
actionwp_headascendingposts.php:147
actionedit_category_form_fieldsascendingposts.php:148
actionedited_categoryascendingposts.php:149
actioninitascendingposts.php:155
actionadmin_headfly_plugins_tools.php:16
Maintenance & Trust

Ascending Posts by Fly Plugins Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 16, 2024
PHP min version
Downloads12K

Community Trust

Rating74/100
Number of ratings15
Active installs500
Developer Profile

Ascending Posts by Fly Plugins Developer Profile

flyplugins

16 plugins · 2K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ascending Posts by Fly Plugins

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
fly-iconpostbox-containermetabox-holdermeta-box-sortables
Data Attributes
id="cat_meta[order]"name="cat_meta[order]"
FAQ

Frequently Asked Questions about Ascending Posts by Fly Plugins