Buttons to Edit Next/Previous Post Security & Risk Analysis

wordpress.org/plugins/buttons-to-edit-next-previous-post

This plugin will add easy shortcut buttons to edit next and previous post in admin edit-post page. You can directly navigate to next and previous post …

1K active installs v1.2 PHP 5.0+ WP 3.2+ Updated Nov 26, 2023
edit-next-previous-post-button-in-adminedit-post-page-add-new-button
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Buttons to Edit Next/Previous Post Safe to Use in 2026?

Generally Safe

Score 85/100

Buttons to Edit Next/Previous Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of "buttons-to-edit-next-previous-post" v1.2 reveals a plugin with a very limited attack surface, as indicated by zero entry points detected. The code also demonstrates good practice in its handling of SQL queries, exclusively using prepared statements, and reports no external HTTP requests or file operations. This suggests a focus on secure data handling and a minimal external footprint.

However, a significant concern arises from the complete lack of output escaping. With 8 total outputs and 0% properly escaped, any data rendered by this plugin is potentially vulnerable to cross-site scripting (XSS) attacks. This is a critical oversight that could be exploited by an attacker to inject malicious scripts into a user's browser. The absence of nonce checks and capability checks further exacerbates this risk, as there are no mechanisms in place to verify user authorization or prevent unauthorized script execution.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the absence of dangerous functions and critical taint flows, points to a generally well-written codebase in certain aspects. Nevertheless, the unescaped output represents a substantial and direct security risk that overshadows the lack of known vulnerabilities and limited attack surface. The plugin's strengths lie in its SQL security and minimal attack surface, but its weakness in output sanitization is a major concern.

Key Concerns

  • Output escaping missing for all outputs
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Buttons to Edit Next/Previous Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Buttons to Edit Next/Previous Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

Buttons to Edit Next/Previous Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterplugin_row_metaedit-next-previous-post-admin.php:34
actionadmin_print_footer_scriptsedit-next-previous-post-admin.php:42
Maintenance & Trust

Buttons to Edit Next/Previous Post Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 26, 2023
PHP min version5.0
Downloads11K

Community Trust

Rating82/100
Number of ratings11
Active installs1K
Alternatives

Buttons to Edit Next/Previous Post Alternatives

No alternatives data available yet.

Developer Profile

Buttons to Edit Next/Previous Post Developer Profile

Aftab Ali Muni

9 plugins · 34K total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Buttons to Edit Next/Previous Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
prev-postnext-post
HTML Comments
<!--<style>body{background-color:red !important}</style>-->
JS Globals
window.jQuery
FAQ

Frequently Asked Questions about Buttons to Edit Next/Previous Post