Category Post Security & Risk Analysis

wordpress.org/plugins/category-post

Add "New Post" by Categories in admin menu.

30 active installs v0.8 PHP + WP 3.1+ Updated Dec 30, 2011
category
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Category Post Safe to Use in 2026?

Generally Safe

Score 85/100

Category Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "category-post" plugin v0.8 exhibits a mixed security posture. On the positive side, the static analysis reveals no obvious high-risk elements like dangerous functions, raw SQL queries, file operations, or external HTTP requests. The absence of known vulnerabilities in its history is also a strong indicator of a well-maintained or less complex plugin. However, several areas raise significant concerns. The fact that 100% of outputs are not properly escaped presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the presence of taint flows with unsanitized paths. While the number of flows is low (2), the fact that they are unsanitized is a critical weakness. Furthermore, the complete lack of capability checks and nonce checks on potential entry points (even though the static analysis reports zero entry points in this specific scan) suggests a potential for privilege escalation or unauthorized actions if any new entry points are introduced or if the static analysis missed something. The plugin's strengths lie in its apparent avoidance of common direct injection vulnerabilities, but its output handling and lack of robust authorization checks are significant weaknesses.

Key Concerns

  • Unsanitized output detected
  • Taint flows with unsanitized paths
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Category Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Category Post Release Timeline

v0.8Current
Code Analysis
Analyzed Mar 16, 2026

Category Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
add_input_tag (category-post.php:84)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Category Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitcategory-post.php:36
actionadmin_menucategory-post.php:37
actionadmin_menucategory-post.php:38
actionadmin_print_scriptscategory-post.php:39
actiondbx_post_sidebarcategory-post.php:40
actionsave_postcategory-post.php:41
Maintenance & Trust

Category Post Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedDec 30, 2011
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Category Post Developer Profile

Toro_Unit (Hiroshi Urabe)

23 plugins · 216K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Category Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/category-post/scripts.js
Script Paths
scripts.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Category Post