[CR]PostWarning Security & Risk Analysis

wordpress.org/plugins/crpostwarning

help you avoid a situation where you publish post but forgot to set title / tags / categories / faetured images / etc.

10 active installs v0.0.2 PHP + WP 3.0+ Updated Dec 2, 2010
alertpopuppublish
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is [CR]PostWarning Safe to Use in 2026?

Generally Safe

Score 85/100

[CR]PostWarning has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The crpostwarning v0.0.2 plugin exhibits a generally strong security posture based on the static analysis and vulnerability history provided. There are no identified attack surfaces, dangerous functions, raw SQL queries, external HTTP requests, or issues with bundled libraries. The absence of known CVEs, especially critical or high severity ones, further suggests a mature and well-maintained codebase.

However, a significant concern arises from the output escaping. With 100% of outputs unescaped, this presents a clear risk of cross-site scripting (XSS) vulnerabilities. If any data processed by the plugin is displayed to users without proper sanitization, an attacker could potentially inject malicious scripts. While the current attack surface is zero, this weakness in output handling could become a critical entry point if any new features are added or if existing, unobserved data is outputted.

In conclusion, the plugin benefits from a lack of direct attack vectors and known vulnerabilities. The primary weakness lies in its output escaping, which requires immediate attention to prevent potential XSS attacks. Addressing this single critical area would significantly enhance its overall security.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

[CR]PostWarning Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

[CR]PostWarning Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

[CR]PostWarning Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

[CR]PostWarning Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_headcr-postwarning.php:13
actionadmin_menucr-postwarning.php:59
Maintenance & Trust

[CR]PostWarning Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedDec 2, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

[CR]PostWarning Developer Profile

Arief Bayu Purwanto

4 plugins · 40 total installs

92
trust score
Avg Security Score
89/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect [CR]PostWarning

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about [CR]PostWarning