Authors as Taxonomy Security & Risk Analysis

wordpress.org/plugins/authors-as-taxonomy

Decouple authors from users. Instead of using users as authors use a special taxonomy for it.

10 active installs v1.0.0 PHP 7.0+ WP 4.5+ Updated Unknown
authorscalmpressmultiple-authorssecurity
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Authors as Taxonomy Safe to Use in 2026?

Generally Safe

Score 100/100

Authors as Taxonomy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'authors-as-taxonomy' plugin version 1.0.0 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the use of prepared statements for all SQL queries and the presence of at least one capability check are good security practices. The lack of recorded vulnerabilities and CVEs is also a strong indicator of a well-maintained and secure plugin over its history.

However, a key area of concern is the output escaping. With 46% of outputs not being properly escaped, there is a potential risk of Cross-Site Scripting (XSS) vulnerabilities. If user-supplied data is not properly sanitized before being displayed, an attacker could inject malicious scripts. The analysis also shows no taint analysis data, which makes it difficult to fully assess the impact of potential data flows and sanitization issues. While the plugin's limited entry points and good SQL practices are strengths, the unescaped output represents a tangible risk that warrants attention.

Key Concerns

  • 46% of outputs not properly escaped
Vulnerabilities
None known

Authors as Taxonomy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Authors as Taxonomy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
12 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

46% escaped26 total outputs
Attack Surface

Authors as Taxonomy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
filtermanage_media_columnsauthors-as-taxonomy.php:58
filteradd_meta_boxesauthors-as-taxonomy.php:61
filterdefault_hidden_meta_boxesauthors-as-taxonomy.php:64
actionadmin_initauthors-as-taxonomy.php:67
actionadmin_menuauthors-as-taxonomy.php:69
filterthe_author_posts_linkauthors-as-taxonomy.php:71
filterauthor_linkauthors-as-taxonomy.php:82
filterthe_authorauthors-as-taxonomy.php:85
actiontemplate_redirectauthors-as-taxonomy.php:88
actiondo_feed_atomauthors-as-taxonomy.php:109
actiondo_feed_rss2authors-as-taxonomy.php:130
actioninitinternal\authors-as-taxonomy\functions.php:138
actionwp_loadedinternal\authors-as-taxonomy\functions.php:154
Maintenance & Trust

Authors as Taxonomy Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Authors as Taxonomy Developer Profile

Mark-k

7 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Authors as Taxonomy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/authors-as-taxonomy/integration/authors-as-taxonomy/feed-atom.php/wp-content/plugins/authors-as-taxonomy/integration/authors-as-taxonomy/feed-rss2.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Authors as Taxonomy