CleanCodeNZ Exclude Pages Plugin Security & Risk Analysis

wordpress.org/plugins/cleancode-exclude-pages

This is a plugin to hide pages from navigation and/or search results using custom fields, parent and child pages are supported too

20 active installs v2.0.0 PHP + WP + Updated Feb 6, 2011
exclude-pagesmenunavigationsearchwp_list_pages_excludes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CleanCodeNZ Exclude Pages Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

CleanCodeNZ Exclude Pages Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "cleancode-exclude-pages" plugin v2.0.0 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The plugin has a zero-point attack surface, meaning it doesn't expose any AJAX handlers, REST API routes, shortcodes, or cron events, which are common entry points for vulnerabilities. Furthermore, it utilizes prepared statements for all SQL queries, preventing SQL injection risks, and has no file operations or external HTTP requests, further reducing its attack vectors. The complete absence of known CVEs and its clean vulnerability history also contribute to a positive security assessment, suggesting a well-maintained and secure codebase.

However, the analysis does highlight a significant concern: 100% of its output is not properly escaped. This means that any data outputted by the plugin, if it originates from user input or other external sources, could be vulnerable to Cross-Site Scripting (XSS) attacks. While the plugin has no direct entry points that are unauthenticated, if data is somehow introduced into the system and then outputted unescaped by this plugin, an attacker could potentially inject malicious scripts into the user's browser. The lack of nonce and capability checks, while not directly indicative of a vulnerability given the zero attack surface, could become a concern if future versions introduce any new entry points without adequate security measures. Overall, the plugin is well-protected against common server-side attacks, but the unescaped output presents a notable XSS risk that should be addressed.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

CleanCodeNZ Exclude Pages Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CleanCodeNZ Exclude Pages Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

CleanCodeNZ Exclude Pages Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initcleancodenzexlp.php:42
filterpre_get_postscleancodenzexlp.php:214
filterwp_list_pages_excludescleancodenzexlp.php:217
actionadmin_menucleancodenzexlp.php:219
Maintenance & Trust

CleanCodeNZ Exclude Pages Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedFeb 6, 2011
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

CleanCodeNZ Exclude Pages Plugin Developer Profile

cleancodenz

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CleanCodeNZ Exclude Pages Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about CleanCodeNZ Exclude Pages Plugin