Custom Post Taxonomy Security & Risk Analysis

wordpress.org/plugins/custom-post-taxonomy

Custom Post Taxonomy

10 active installs v1.0 PHP + WP 4.0+ Updated Sep 19, 2016
custom-post-typepostslugtype
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Post Taxonomy Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Post Taxonomy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin "custom-post-taxonomy" v1.0 exhibits a mixed security posture. On the positive side, it demonstrates a strong commitment to secure coding practices by utilizing prepared statements for all SQL queries and including nonce and capability checks. The absence of known CVEs and vulnerabilities in its history is also a positive indicator. However, a significant concern arises from the presence of five instances of the `unserialize` function. Without proper input validation and sanitization, `unserialize` can lead to object injection vulnerabilities, allowing attackers to potentially execute arbitrary code or manipulate application behavior.

The static analysis reveals a clean attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or authorization. Taint analysis also shows no identified flows with unsanitized paths, suggesting that known vulnerabilities of this type are not present in this version. Despite these strengths, the reliance on `unserialize` without explicit safeguards represents a potential blind spot. The low percentage of properly escaped output (33%) is also a minor concern that could lead to cross-site scripting (XSS) vulnerabilities if sensitive data is displayed directly to users.

Key Concerns

  • Dangerous function 'unserialize' used 5 times
  • Only 33% of output properly escaped
Vulnerabilities
None known

Custom Post Taxonomy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom Post Taxonomy Code Analysis

Dangerous Functions
5
Raw SQL Queries
0
0 prepared
Unescaped Output
6
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$cuptaxnf_custom_posts_disp = unserialize(get_option( 'cuptaxnf_custom_post_opt' ));cuptaxna-dmin.php:38
unserialize$cuptaxnf_custom_posts_disp = unserialize(get_option( 'cuptaxnf_custom_post_opt' ));cuptaxna-dmin.php:64
unserialize$cuptaxnf_custom_post = unserialize(get_option( 'cuptaxnf_custom_post_opt' ));cuptaxna-dmin.php:85
unserialize$cuptaxnf_custom_posts_disp = unserialize(get_option( 'cuptaxnf_custom_post_opt' ));cuptaxna-dmin.php:93
unserialize$cuptaxnf_custom_posts_disp = unserialize(get_option( 'cuptaxnf_custom_post_opt' ));main.php:44

Output Escaping

33% escaped9 total outputs
Attack Surface

Custom Post Taxonomy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menumain.php:16
actionadmin_enqueue_scriptsmain.php:33
actioninitmain.php:39
Maintenance & Trust

Custom Post Taxonomy Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedSep 19, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom Post Taxonomy Developer Profile

farvehandleren

11 plugins · 240 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Taxonomy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-post-taxonomy/css/admin.css/wp-content/plugins/custom-post-taxonomy/js/ricf.js
Script Paths
/wp-content/plugins/custom-post-taxonomy/js/ricf.js
Version Parameters
custom-post-taxonomy/css/admin.css?ver=1.0.0

HTML / DOM Fingerprints

JS Globals
ricftx_script
FAQ

Frequently Asked Questions about Custom Post Taxonomy