CUSTOM OPTIONS PLUS POST IN Security & Risk Analysis

wordpress.org/plugins/custom-options-plus-post-in

This plugin is create to custom options in your WordPress. You can use in the Template and Shortcode.

10 active installs v1.4.1 PHP + WP 3.8+ Updated Feb 16, 2015
admincustomoptionpostshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CUSTOM OPTIONS PLUS POST IN Safe to Use in 2026?

Generally Safe

Score 85/100

CUSTOM OPTIONS PLUS POST IN has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'custom-options-plus-post-in' v1.4.1 plugin demonstrates a generally strong security posture, characterized by the exclusive use of prepared statements for all SQL queries and a robust presence of nonce and capability checks. This indicates a good understanding of fundamental WordPress security practices, particularly in preventing common SQL injection and authorization bypass vulnerabilities.

However, a significant concern arises from the 'Output escaping' metric, with only 17% of outputs being properly escaped. This leaves a considerable portion of the plugin's output potentially vulnerable to Cross-Site Scripting (XSS) attacks, where unsanitized data could be injected into the page and executed in a user's browser. Additionally, the taint analysis revealed one flow with an unsanitized path, which, while not flagged as critical or high severity in this specific report, warrants investigation as it could represent a potential avenue for file inclusion or path traversal vulnerabilities if exploited in conjunction with other weaknesses.

The complete absence of known vulnerabilities in its history is a positive indicator, suggesting a history of stable and relatively secure development. Nonetheless, the identified output escaping deficiency and the unsanitized path flow represent exploitable weaknesses that could be leveraged by attackers. While the overall security is good due to strong SQL and authentication practices, the XSS risk and the unsanitized path need to be addressed to achieve a truly secure state.

Key Concerns

  • Low percentage of properly escaped output
  • Flow with unsanitized path found
Vulnerabilities
None known

CUSTOM OPTIONS PLUS POST IN Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CUSTOM OPTIONS PLUS POST IN Release Timeline

v1.4.1Current
v1.4
v1.3.2.1
v1.3.2
v1.3.1
v1.3
v1.2.3
v1.2.2
v1.2.1
v1.2
v1.1.1
v1.1
v1.0.1
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

CUSTOM OPTIONS PLUS POST IN Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
11 prepared
Unescaped Output
97
20 escaped
Nonce Checks
10
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared11 total queries

Output Escaping

17% escaped117 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
update (core/info.php:211)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CUSTOM OPTIONS PLUS POST IN Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_initcore/info.php:35
actionnetwork_admin_noticescore/info.php:183
actionadmin_noticescore/info.php:187
actioninitcore/init.php:37
actioninitcustom-options-plus-post-in.php:80
actionnetwork_admin_menumanager/abstract-controller.php:51
actionadmin_menumanager/abstract-controller.php:55
actionadmin_initmanager/abstract-controller.php:59
actionnetwork_admin_noticesmanager/abstract-controller.php:88
actionnetwork_admin_noticesmanager/abstract-controller.php:89
actionadmin_noticesmanager/abstract-controller.php:93
actionadmin_noticesmanager/abstract-controller.php:94
actionadmin_print_scriptsmanager/abstract-controller.php:98
Maintenance & Trust

CUSTOM OPTIONS PLUS POST IN Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedFeb 16, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

CUSTOM OPTIONS PLUS POST IN Developer Profile

gqevu6bsiz

12 plugins · 47K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
183 days
View full developer profile
Detection Fingerprints

How We Detect CUSTOM OPTIONS PLUS POST IN

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-options-plus-post-in/manager/assets/css/manager.css/wp-content/plugins/custom-options-plus-post-in/manager/assets/js/manager.js
Script Paths
/wp-content/plugins/custom-options-plus-post-in/manager/assets/js/manager.js
Version Parameters
custom-options-plus-post-in/manager/assets/js/manager.js?ver=custom-options-plus-post-in/manager/assets/css/manager.css?ver=

HTML / DOM Fingerprints

CSS Classes
coppi
Data Attributes
class="wrap coppi"
JS Globals
coppi
FAQ

Frequently Asked Questions about CUSTOM OPTIONS PLUS POST IN