Authors Posts Widget Security & Risk Analysis

wordpress.org/plugins/authors-posts-widget

Authors posts widget with blogger style.

90 active installs v1.4.2 PHP 7.0+ WP 3.0+ Updated Oct 25, 2025
all-posts-widgetauthors-postsposts-by-authorsposts-widget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Authors Posts Widget Safe to Use in 2026?

Generally Safe

Score 100/100

Authors Posts Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "authors-posts-widget" plugin version 1.4.2 exhibits a strong security posture in several key areas. The complete absence of identified CVEs and a history of no recorded vulnerabilities suggest a well-maintained and secure codebase. Furthermore, the static analysis reveals no critical code signals such as dangerous functions, file operations, or external HTTP requests. The lack of identified taint flows also indicates a low risk of traditional injection vulnerabilities.

However, there are notable concerns that temper this positive assessment. The plugin performs SQL queries without using prepared statements, presenting a significant risk of SQL injection if any user-controlled input is incorporated into these queries. Additionally, the complete absence of nonce checks and capability checks across all entry points, which are zero in this case, indicates a reliance on WordPress's core security for any potential future entry points. While the current attack surface is zero, if any functionality were to be added that exposed these entry points without proper authorization checks, it would be inherently insecure.

In conclusion, while the plugin's current state appears very secure due to its limited functionality and clean vulnerability history, the use of raw SQL queries and the complete lack of internal security checks on potential entry points represent specific weaknesses that require attention. The overall risk is currently low due to the absence of exploitable entry points, but the underlying practices introduce potential vulnerabilities should the plugin evolve.

Key Concerns

  • 100% of SQL queries not using prepared statements
  • 0 Nonce checks on any entry points
  • 0 Capability checks on any entry points
Vulnerabilities
None known

Authors Posts Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Authors Posts Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
8
35 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

81% escaped43 total outputs
Attack Surface

Authors Posts Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initinc\functions.php:159
actionwp_enqueue_scriptsindex.php:55
Maintenance & Trust

Authors Posts Widget Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 25, 2025
PHP min version7.0
Downloads9K

Community Trust

Rating100/100
Number of ratings2
Active installs90
Developer Profile

Authors Posts Widget Developer Profile

Fahad Mahmood

40 plugins · 33K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
237 days
View full developer profile
Detection Fingerprints

How We Detect Authors Posts Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/authors-posts-widget/css/style.css/wp-content/plugins/authors-posts-widget/js/functions.js
Script Paths
/wp-content/plugins/authors-posts-widget/js/functions.js
Version Parameters
authors-posts-widget/css/style.css?ver=authors-posts-widget/js/functions.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Authors Posts Widget