cbnet Different Posts Per Page Security & Risk Analysis

wordpress.org/plugins/cbnet-different-posts-per-page

Customize the number of posts, orderby, and order parameters for all index pages (blog/home, search, category, tag, taxonomy, author, date, and archiv …

400 active installs v2.2 PHP + WP 3.3+ Updated Apr 13, 2016
cbnetorderorderbyposts_per_pagepre_get_posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is cbnet Different Posts Per Page Safe to Use in 2026?

Generally Safe

Score 85/100

cbnet Different Posts Per Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of "cbnet-different-posts-per-page" v2.2 reveals a plugin with a remarkably small attack surface, featuring no identifiable AJAX handlers, REST API routes, shortcodes, or cron events. This limited exposure generally suggests a lower risk profile. However, a significant concern arises from the complete lack of output escaping. With 12 total outputs analyzed and 0% properly escaped, there is a high probability of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed within the WordPress admin area or on the frontend, depending on where these outputs are displayed. The absence of nonce checks and capability checks further exacerbates this risk, as these are fundamental security mechanisms for preventing CSRF attacks and ensuring proper authorization. The plugin's vulnerability history is clean, with no recorded CVEs, which is positive. However, this clean history, combined with the apparent lack of robust security implementations like output escaping and proper authorization checks, could indicate that the plugin hasn't been subjected to extensive security scrutiny or that existing vulnerabilities have simply gone unnoticed or unreported. In conclusion, while the plugin boasts a small attack surface and no known historical vulnerabilities, the critical deficiency in output escaping and the absence of essential security checks like nonces and capability checks present a substantial risk of XSS and potential authorization bypasses.

Key Concerns

  • Complete lack of output escaping
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

cbnet Different Posts Per Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

cbnet Different Posts Per Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Attack Surface

cbnet Different Posts Per Page Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedcbnet-different-posts-per-page.php:73
actionpre_get_postscbnet-different-posts-per-page.php:203
actionadmin_initoptions.php:42
Maintenance & Trust

cbnet Different Posts Per Page Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 13, 2016
PHP min version
Downloads29K

Community Trust

Rating74/100
Number of ratings3
Active installs400
Developer Profile

cbnet Different Posts Per Page Developer Profile

Chip Bennett

7 plugins · 3K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect cbnet Different Posts Per Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cbnet-different-posts-per-page/css/cbnet-dppp-admin.css/wp-content/plugins/cbnet-different-posts-per-page/js/cbnet-dppp-admin.js

HTML / DOM Fingerprints

JS Globals
cbnetdppp_options
FAQ

Frequently Asked Questions about cbnet Different Posts Per Page