Clean Post Content Security & Risk Analysis

wordpress.org/plugins/clean-post-content

Removes shortcodes from posts and pages.

0 active installs v1.0.0 PHP 5.6.39+ WP 6.0+ Updated Aug 21, 2024
contentdescriptionspostpost-typeshortcode
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Clean Post Content Safe to Use in 2026?

Generally Safe

Score 92/100

Clean Post Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'clean-post-content' plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Crucially, all SQL queries are properly prepared, and there are no indications of unsanitized taint flows, which are positive indicators. The plugin also demonstrates good practices in file operation handling and avoids making external HTTP requests.

However, there are areas that warrant attention. The plugin has zero capability checks and zero nonce checks, which are fundamental security mechanisms in WordPress, especially if any of the file operations were to interact with user-supplied data or lead to state changes. While the output escaping is partially effective, the fact that 33% of outputs are not properly escaped could lead to cross-site scripting (XSS) vulnerabilities if the content being processed or displayed originates from or is manipulated by user input. The lack of any documented vulnerability history is a positive sign, suggesting a history of secure development, but it does not negate the potential risks identified in the code analysis.

In conclusion, while the plugin demonstrates good fundamental security practices like prepared SQL statements and no taint flows, the complete absence of capability and nonce checks, coupled with a percentage of unescaped output, represents potential security weaknesses that should be addressed. The limited attack surface is a significant strength, but these specific oversights could still lead to vulnerabilities.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
  • Unescaped output detected
Vulnerabilities
None known

Clean Post Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Clean Post Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped6 total outputs
Attack Surface

Clean Post Content Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_enqueue_scriptsclean-post-content.php:15
actionadmin_menuclean-post-content.php:21
Maintenance & Trust

Clean Post Content Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedAug 21, 2024
PHP min version5.6.39
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Clean Post Content Developer Profile

matthewsudekum

3 plugins · 10 total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Clean Post Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
buttonbutton-primary
Data Attributes
id="shortcodes"name="shortcodes"id="post-type"name="post-type"
Shortcode Output
[example-1],[example-2]
FAQ

Frequently Asked Questions about Clean Post Content