Custom Post Links Security & Risk Analysis

wordpress.org/plugins/custom-post-links

Adds a new metabox to the editor, allowing you to attach a set of related links to any post.

10 active installs v2.0.8 PHP + WP 3.5+ Updated Dec 14, 2016
custom-linkslinkspost-linksquick-linksrelated-links
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Post Links Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Post Links has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "custom-post-links" plugin version 2.0.8 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for its SQL queries and having a clean vulnerability history with no known CVEs. The presence of nonce and capability checks suggests an awareness of common WordPress security mechanisms. However, a significant concern arises from the single identified AJAX handler, which lacks any authentication checks. This unprotected entry point presents a direct avenue for potential exploitation, especially if the handler performs sensitive operations or accepts user-supplied data without proper validation.

The static analysis reveals that while dangerous functions and critical taint flows are absent, the low percentage of properly escaped output (36%) is a notable weakness. This could lead to cross-site scripting (XSS) vulnerabilities if data is not adequately sanitized before being displayed to users. The plugin's attack surface is currently small, but the unprotected AJAX handler represents a critical vulnerability within that surface. The absence of any recorded past vulnerabilities is a positive indicator, suggesting a generally stable codebase, but it does not negate the risks identified in the current version's analysis.

Key Concerns

  • AJAX handler without authentication
  • Low percentage of properly escaped output
Vulnerabilities
None known

Custom Post Links Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Post Links Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
7
4 escaped
Nonce Checks
1
Capability Checks
4
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

36% escaped11 total outputs
Attack Surface
1 unprotected

Custom Post Links Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_cp_links_get_url_titlecp_links-ajax.php:19
WordPress Hooks 13
actionadmin_menucp_links-settings.php:6
actionadmin_initcp_links-settings.php:7
filterpre_option_link_manager_enabledcustom-post-links.php:110
actionplugins_loadedcustom-post-links.php:112
actionadmin_initcustom-post-links.php:114
actionadmin_initcustom-post-links.php:115
actionadmin_enqueue_scriptscustom-post-links.php:117
actionwp_enqueue_scriptscustom-post-links.php:119
actionadd_meta_boxescustom-post-links.php:121
actionsave_postcustom-post-links.php:122
filterthe_contentcustom-post-links.php:124
filterredirect_post_locationcustom-post-links.php:126
actionadmin_noticescustom-post-links.php:164
Maintenance & Trust

Custom Post Links Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedDec 14, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom Post Links Developer Profile

grosbouff

16 plugins · 380 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Links

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Post Links