CPT on Front Page Security & Risk Analysis

wordpress.org/plugins/cpt-on-front-page

This plugin allows post types other than "page" to be displayed as the static front page.

30 active installs v1.0.1 PHP + WP 3.5+ Updated Mar 24, 2014
custom-post-typesfront-page
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CPT on Front Page Safe to Use in 2026?

Generally Safe

Score 85/100

CPT on Front Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "cpt-on-front-page" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential attack surface. Furthermore, the code demonstrates good practices by avoiding dangerous functions, performing file operations, making external HTTP requests, and utilizing prepared statements for all SQL queries. The absence of any identified vulnerability history, including critical or high-severity CVEs, further reinforces this positive assessment.

However, there are a few areas for improvement. The plugin has a relatively low rate of output escaping (20%), meaning that some user-controlled data displayed on the front-end might not be properly sanitized, potentially leading to cross-site scripting (XSS) vulnerabilities if user input is not handled carefully elsewhere. The lack of nonce and capability checks on entry points, while there are no entry points currently, indicates a potential weakness if the plugin were to be expanded in the future without implementing these crucial security mechanisms. Overall, while the current version is very secure due to its limited attack surface and robust internal practices, attention to output escaping and preparedness for future expansion with proper authentication are areas that could enhance its security further.

Key Concerns

  • Low output escaping rate
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

CPT on Front Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

CPT on Front Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped5 total outputs
Attack Surface

CPT on Front Page Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterparse_queryplugin.php:21
filterpre_get_postsplugin.php:22
filterwp_dropdown_pagesplugin.php:23
filterpost_type_linkplugin.php:24
actionadmin_initplugin.php:25
Maintenance & Trust

CPT on Front Page Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 24, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs30
Developer Profile

CPT on Front Page Developer Profile

fabrizim

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CPT on Front Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about CPT on Front Page