CollectionPress Security & Risk Analysis

wordpress.org/plugins/collectionpress

CollectionPress provides a variety of features for building author or researcher pages within Wordpress. Items archived in DSpace can also be display …

10 active installs v1.0.0 PHP + WP 4.5+ Updated Aug 8, 2017
author-pageauthorsdspacerest
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CollectionPress Safe to Use in 2026?

Generally Safe

Score 85/100

CollectionPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "collectionpress" v1.0.0 plugin exhibits a mixed security posture. While the absence of known CVEs and the use of prepared statements for SQL queries are positive indicators, significant concerns arise from the static analysis. The presence of an unprotected AJAX handler represents a direct entry point for potential attackers. Furthermore, a high percentage of output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. The taint analysis, while reporting no critical or high severity flows, did identify flows with unsanitized paths, suggesting potential for unexpected behavior or data exposure if these flows interact with sensitive operations.

The vulnerability history is clean, which is a strength and suggests a potentially well-maintained codebase or a lack of past focus from attackers. However, the current static analysis findings, particularly the unprotected AJAX handler and unescaped output, present immediate risks that need to be addressed. The plugin has strengths in its lack of historical vulnerabilities and secure SQL handling, but weaknesses in input validation and output sanitization. The overall risk is moderate, primarily due to the unprotected entry point and potential for XSS.

Key Concerns

  • Unprotected AJAX handler
  • High percentage of unescaped output
  • Unsanitized paths in taint flows
Vulnerabilities
None known

CollectionPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CollectionPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
35
7 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

17% escaped42 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
<class-collectionpress-shortcode> (frontend\class-collectionpress-shortcode.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

CollectionPress Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_cpr_get_author_ajaxcollectionpress.php:43

Shortcodes 1

[collectionpress] collectionpress.php:46
WordPress Hooks 15
actioninitcollectionpress.php:24
actionadmin_initcollectionpress.php:35
actionadmin_menucollectionpress.php:41
actioninitincludes\register-posts.php:18
filtertemplate_includeincludes\register-posts.php:19
filterenter_title_hereincludes\register-posts.php:20
filterpage_templateincludes\register-posts.php:21
filterfrontpage_templateincludes\register-posts.php:22
actionadd_meta_boxesincludes\register-posts.php:23
actionsave_postincludes\register-posts.php:24
actioninitincludes\register-posts.php:25
actioninitincludes\register-posts.php:26
actionwp_enqueue_scriptsincludes\register-posts.php:28
actioncpr_stylesincludes\register-posts.php:29
actionwp_headincludes\register-posts.php:30
Maintenance & Trust

CollectionPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedAug 8, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CollectionPress Developer Profile

knowledgearc

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CollectionPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/collectionpress/frontend/css/collectionpress.css/wp-content/plugins/collectionpress/frontend/js/collectionpress.js
Script Paths
/wp-content/plugins/collectionpress/frontend/js/collectionpress.js
Version Parameters
collectionpress/frontend/css/collectionpress.css?ver=collectionpress/frontend/js/collectionpress.js?ver=

HTML / DOM Fingerprints

CSS Classes
cp_author_page_title
HTML Comments
<!-- CollectionPress Shortcode --><!-- author name --><!-- author bio --><!-- author items -->
Data Attributes
data-author-iddata-item-id
JS Globals
collectionpress_ajax_urlcollectionpress_params
REST Endpoints
/wp-json/collectionpress/v1/authors/wp-json/collectionpress/v1/items
Shortcode Output
[collectionpress]
FAQ

Frequently Asked Questions about CollectionPress