BE – Main Category Selector Security & Risk Analysis

wordpress.org/plugins/be-main-category

Main Category Selector for WordPress 2.5+.

10 active installs v2.1.1 PHP + WP + Updated Unknown
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BE – Main Category Selector Safe to Use in 2026?

Generally Safe

Score 100/100

BE – Main Category Selector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "be-main-category" v2.1.1 plugin exhibits significant security concerns despite a seemingly clean vulnerability history. The static analysis reveals a lack of critical security best practices. Notably, 100% of SQL queries are not using prepared statements, and there is a complete absence of output escaping. This means that any data inserted into or retrieved from the database could be vulnerable to SQL injection attacks, and user-supplied data displayed on the frontend is susceptible to cross-site scripting (XSS) attacks.

The taint analysis further highlights these risks, identifying two flows with unsanitized paths, both classified as high severity. This indicates potential pathways where untrusted data could be processed without proper sanitization, leading to exploitable vulnerabilities. The absence of nonce checks, capability checks, and authentication checks on all identified entry points (even though there are zero in this case) also points to a general disregard for common WordPress security measures. While there are no known CVEs for this plugin, the internal code quality issues present a substantial risk that could easily lead to exploitable vulnerabilities.

In conclusion, while the plugin doesn't have a known history of public vulnerabilities, the static analysis strongly suggests a weak security posture. The lack of prepared statements for SQL queries and proper output escaping, combined with high-severity taint flows, are critical red flags. Users of this plugin should be aware of the inherent risks due to these coding practices, as they create a fertile ground for security vulnerabilities.

Key Concerns

  • SQL queries not using prepared statements
  • Output escaping is not used
  • High severity taint flows found
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

BE – Main Category Selector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BE – Main Category Selector Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
mcsbe_save_maincategory (be-main-category.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

BE – Main Category Selector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionactivate_be-main-category/be-main-category.phpbe-main-category.php:16
actionsave_postbe-main-category.php:33
actionedit_postbe-main-category.php:34
actionadmin_menube-main-category.php:63
actiondbx_post_advancedbe-main-category.php:69
filteradmin_footerbe-main-category.php:115
filterthe_permalinkbe-main-category.php:205
filterpost_linkbe-main-category.php:206
Maintenance & Trust

BE – Main Category Selector Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

BE – Main Category Selector Alternatives

No alternatives data available yet.

Developer Profile

BE – Main Category Selector Developer Profile

mortay

4 plugins · 140 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BE – Main Category Selector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
dbx-boxdbx-handledbx-content
HTML Comments
<!-- WP 2.3 --><!-- WP 2.5 --><!-- Category Selector --><!-- Load JS Code for Selector in Admin Pages -->+3 more
Data Attributes
id="maincategorydiv"class="dbx-box"class="dbx-handle"class="dbx-content"id="maincategorydiv"name="post_maincategory"+2 more
JS Globals
mcsbe_selectedcategory
FAQ

Frequently Asked Questions about BE – Main Category Selector