Category Pie Security & Risk Analysis

wordpress.org/plugins/category-pie

The Category Pie plugin for WordPress adds a bit of extra flavor to those otherwise boring category administration pages.

20 active installs v1.0 PHP + WP 3.6+ Updated May 9, 2015
categorychartstatstagstaxonomy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Category Pie Safe to Use in 2026?

Generally Safe

Score 85/100

Category Pie has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'category-pie' v1.0 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of any identified CVEs, coupled with a zero-count for dangerous functions, raw SQL queries, file operations, and external HTTP requests, suggests a codebase that adheres to common security best practices. The attack surface is also reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential for external interaction and exploitation.

However, the static analysis reveals a critical concern: 100% of the identified output points are not properly escaped. This means that any data rendered by the plugin, even if it originates from trusted sources within WordPress, could be manipulated by an attacker and then displayed to users in an unsafe manner. This lack of output escaping is a common vector for Cross-Site Scripting (XSS) vulnerabilities, which can lead to session hijacking, defacement, and further compromise of the website.

While the plugin has no recorded vulnerability history, the presence of unescaped output represents a significant, albeit theoretical, risk. A well-written plugin with a clean history is ideal, but the identified code flaw overrides these positive aspects. The absence of taint analysis flows is likely due to the zero attack surface, meaning there were no input vectors to track. In conclusion, the plugin demonstrates good development practices in many areas but has a critical flaw in output sanitization that requires immediate attention.

Key Concerns

  • 0% of output properly escaped
Vulnerabilities
None known

Category Pie Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Category Pie Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Category Pie Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitcategory-pie.php:73
actionadmin_initcategory-pie.php:74
filterplugin_row_metacategory-pie.php:76
actionadmin_initcategory-pie.php:86
actionadmin_headcategory-pie.php:87
actionadmin_noticescategory-pie.php:286
Maintenance & Trust

Category Pie Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 9, 2015
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings1
Active installs20
Developer Profile

Category Pie Developer Profile

Peter J. Herrel

4 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Category Pie

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
cat-pie-admincat-pie-admin-inside
HTML Comments
<!--Category Pie CSS-->
JS Globals
google
FAQ

Frequently Asked Questions about Category Pie