Category Page Extender Security & Risk Analysis

wordpress.org/plugins/category-page-extender

Inserts posts into pages corresponding to category. Add on plugin for Category Page by pixline.net. Requieres an active installation of Category Page …

40 active installs v1.0.3 PHP + WP 2.2+ Updated Dec 31, 2009
admincategoriescategoryformattingpages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Category Page Extender Safe to Use in 2026?

Generally Safe

Score 85/100

Category Page Extender has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The category-page-extender plugin exhibits a concerning security posture despite a lack of recorded CVEs and a seemingly small attack surface. The static analysis reveals a significant weakness in its handling of SQL queries: 100% of the identified queries do not use prepared statements. This is a critical vulnerability that could lead to SQL injection attacks, allowing attackers to manipulate or extract sensitive data from the database. Furthermore, the taint analysis shows that all analyzed flows have unsanitized paths, indicating that user-supplied data is not being properly validated or cleansed before being used in sensitive operations. While there are no direct AJAX, REST API, or shortcode entry points without authentication, the unsanitized taint flows suggest that these could be indirectly exploited. The complete absence of capability checks and nonce checks, combined with a low rate of proper output escaping (18%), amplifies the risk of various attacks, including cross-site scripting (XSS) and privilege escalation, especially if any form of user input indirectly reaches these vulnerable code paths. The plugin's history of zero known vulnerabilities is a positive sign but does not negate the severe risks identified in the current code analysis.

Key Concerns

  • SQL queries lack prepared statements
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
  • Low percentage of properly escaped output
Vulnerabilities
None known

Category Page Extender Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Category Page Extender Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
9
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

18% escaped11 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
page2cat_pages (category-page-extender.php:28)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Category Page Extender Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Category Page Extender Maintenance & Trust

Maintenance Signals

WordPress version tested2.8.4
Last updatedDec 31, 2009
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Category Page Extender Developer Profile

grpsmglr00

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Category Page Extender

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/category-page-extender/default/catpage.css

HTML / DOM Fingerprints

CSS Classes
p2c-navigationp2c-navp2c-currentpage
HTML Comments
You can replace the code below to match your themeyou can copy this from your archive.php, index.php or customize it ----- Start Code Replace ------ ----- End Code Replace ------ +1 more
FAQ

Frequently Asked Questions about Category Page Extender