cool Popular Post Security & Risk Analysis

wordpress.org/plugins/cool-popular-post

A very easy to use WordPress function to add popular posts to any WordPress theme.

10 active installs v1.0 PHP + WP 3.0.0+ Updated Jan 18, 2015
bestmost-viewedpopularpopular-postspost-plugins
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is cool Popular Post Safe to Use in 2026?

Generally Safe

Score 85/100

cool Popular Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "cool-popular-post" v1.0 plugin exhibits a concerning security posture primarily due to a severe lack of output escaping and the absence of fundamental security checks. While the static analysis shows a limited attack surface and no dangerous functions or file operations, the fact that 100% of SQL queries are not using prepared statements is a significant red flag for potential SQL injection vulnerabilities. Furthermore, the complete lack of output escaping for all 13 identified outputs means that any data displayed to users could be manipulated, leading to cross-site scripting (XSS) attacks. The absence of nonce checks and capability checks on the single shortcode also leaves it vulnerable to unauthorized execution and privilege escalation if any user-supplied input is processed within it. The plugin's vulnerability history shows no recorded CVEs, which is a positive sign, but this can also be indicative of a lack of widespread testing or a small user base, rather than inherent security. Coupled with the identified code weaknesses, the lack of historical vulnerabilities should not be seen as a guarantee of safety. In conclusion, despite a small attack surface and no evident critical vulnerabilities in taint analysis, the "cool-popular-post" v1.0 plugin is highly susceptible to SQL injection and XSS attacks due to fundamental security oversights in its coding practices. The absence of basic security checks like prepared statements and output escaping poses a significant risk.

Key Concerns

  • 100% SQL queries without prepared statements
  • 0% output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

cool Popular Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

cool Popular Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
13
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped13 total outputs
Attack Surface

cool Popular Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[cool_popular_posts] cool-popular-posts.php:29
WordPress Hooks 2
actionwidgets_initcool-popular-posts.php:267
actionthe_contentcool-popular-posts.php:294
Maintenance & Trust

cool Popular Post Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 18, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

cool Popular Post Developer Profile

culplarry

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect cool Popular Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_cool_popular_postscreditlink
Shortcode Output
<li class="<a href="<span class='title'><div class='thumbnail'>
FAQ

Frequently Asked Questions about cool Popular Post