Category Expander Security & Risk Analysis

wordpress.org/plugins/category-expander

Allows WordPress Admins to show only a selected few categories on the sidebar and hide the rest from view until visitor clicks "See All".

10 active installs v0.9.1 PHP + WP 2.8+ Updated Sep 18, 2012
categoriessidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Category Expander Safe to Use in 2026?

Generally Safe

Score 85/100

Category Expander has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The category-expander plugin version 0.9.1 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of known CVEs, critical taint flows, and dangerous functions is a positive sign. Furthermore, the code does not appear to perform file operations or external HTTP requests, and it has no shortcodes or cron events, significantly limiting its attack surface. The adherence to prepared statements for SQL queries is also a strong security practice.

However, a significant concern arises from the complete lack of proper output escaping. With 15 total outputs and 0% properly escaped, this plugin is highly vulnerable to Cross-Site Scripting (XSS) attacks. Any data displayed to users without proper sanitization can be manipulated by attackers to inject malicious scripts. The absence of nonce checks and capability checks on any potential entry points (though none were identified in this analysis) is also a weakness that could be exploited if new entry points are introduced without proper security controls.

In conclusion, while the plugin avoids common severe vulnerabilities like SQL injection or known exploits, the critical flaw in output escaping presents a substantial risk. If the plugin handles user-supplied data or dynamic content that is then displayed, XSS vulnerabilities are highly likely. The plugin's vulnerability history showing no prior issues is encouraging but does not mitigate the identified XSS risk. Addressing the output escaping is paramount to improving its security.

Key Concerns

  • 100% of outputs are not properly escaped
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Category Expander Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Category Expander Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped15 total outputs
Attack Surface

Category Expander Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menucategory_expander.php:27
actionadmin_initcategory_expander.php:28
actioninitcategory_expander.php:29
actionwidgets_initcategory_expander.php:30
filterplugin_action_linkscategory_expander.php:225
Maintenance & Trust

Category Expander Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedSep 18, 2012
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Category Expander Developer Profile

timgrahl

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Category Expander

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/category-expander/category_expander.php

HTML / DOM Fingerprints

CSS Classes
ce_hidden_licategory-listclrcategory-expander
Data Attributes
id="ce_widget_ul"id="ce_seeall_li"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Category Expander