Custom Post Order Security & Risk Analysis

wordpress.org/plugins/custom-post-order

descending , posts, categories, wordpress mu, wpmu Requires at least: 2.6 Tested up to: 2.7 Stable tag: trunk The plugin enables any user to modify t …

400 active installs v1.1 PHP + WP + Updated Jun 5, 2009
customdisplayorderorderbypost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Post Order Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Post Order has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'custom-post-order' plugin version 1.1 presents a generally positive security posture based on the static analysis. It demonstrates good practices by having zero AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points. The absence of dangerous functions and file operations further strengthens its security. Crucially, all SQL queries utilize prepared statements, and there are no recorded vulnerabilities, suggesting a history of responsible development and maintenance.

However, a significant concern arises from the output escaping. With two total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from or passes through this plugin without proper sanitization could be exploited by attackers to inject malicious scripts. While the taint analysis shows no flows, this is likely due to the limited or non-existent entry points that would typically trigger such analysis. The presence of a nonce check and capability check is positive but doesn't mitigate the XSS risk if the output itself is not escaped.

In conclusion, while the plugin excels in preventing direct unauthorized access and injection vectors through its limited attack surface and secure database interactions, the lack of output escaping is a critical weakness. This single oversight creates a significant XSS vulnerability that could be exploited. The plugin's history of zero vulnerabilities is a positive indicator, but it doesn't negate the present risk of unescaped output.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Custom Post Order Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Post Order Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Custom Post Order Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menucustom-post-order.php:59
filterposts_orderbycustom-post-order.php:127
Maintenance & Trust

Custom Post Order Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJun 5, 2009
PHP min version
Downloads49K

Community Trust

Rating100/100
Number of ratings2
Active installs400
Developer Profile

Custom Post Order Developer Profile

ctltwp

15 plugins · 6K total installs

77
trust score
Avg Security Score
84/100
Avg Patch Time
34 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Order

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
License: GPLCustom Post Order - brief descriptionCopyright (C) 2008, OLT, http://olt.ubc.caThis program is free software; you can redistribute it and/or+17 more
Data Attributes
dirname
FAQ

Frequently Asked Questions about Custom Post Order