Jump to Post/Page Security & Risk Analysis

wordpress.org/plugins/autocomplete-post-search-dashboard

This plugin puts an autocomplete search box on a post/page/custom post type editor in the admin area and allows user to jump to any post or page.

10 active installs v1.0.1 PHP + WP 3.5.0+ Updated Aug 17, 2016
autocomplete-post-search-boxautocomplete-search-boxdashboard-search-boxjump-to-pagejump-to-postjump-to-post-and-page
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jump to Post/Page Safe to Use in 2026?

Generally Safe

Score 85/100

Jump to Post/Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "autocomplete-post-search-dashboard" plugin version 1.0.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified vulnerabilities in its history, combined with the lack of dangerous functions, file operations, external HTTP requests, and SQL injection risks (all queries use prepared statements), suggests good development practices regarding common web application security threats. The attack surface is also minimal, with no apparent entry points that are not protected by authentication or authorization checks. This is a positive indicator of a secure plugin.

However, a significant concern arises from the output escaping analysis. With one total output and 0% properly escaped, this indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users through this plugin's output is not being sanitized, making it susceptible to malicious scripts being injected and executed in the user's browser. The absence of nonce checks and capability checks on the identified entry points (though there are none reported, it's a general concern if any were to be added without these protections) further underscores the potential for certain types of attacks if the attack surface were to expand.

In conclusion, while the plugin avoids many common pitfalls like SQL injection and uncontrolled file operations, the glaring issue of unescaped output presents a substantial risk. The lack of any past vulnerabilities is encouraging, but it doesn't negate the current, evident security flaw. Developers should prioritize addressing the output escaping to mitigate the risk of XSS attacks.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

Jump to Post/Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jump to Post/Page Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Jump to Post/Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Jump to Post/Page Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actiondo_meta_boxesjump-to-post-page.php:19
Maintenance & Trust

Jump to Post/Page Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedAug 17, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Jump to Post/Page Developer Profile

Arshad Hussain

5 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jump to Post/Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/autocomplete-post-search-dashboard/autocomplete-post-search-dashboard.php
Script Paths
jquery-ui-autocomplete
Version Parameters
autocomplete-post-search-dashboard/autocomplete-post-search-dashboard.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Jump to Post/Page