Custom Post Text Security & Risk Analysis

wordpress.org/plugins/custom-post-text

This plugin is for adding certain text to every post, before or after.

10 active installs v2.0 PHP + WP 2.0+ Updated Mar 31, 2009
customfooterheaderposttext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Post Text Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Post Text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The 'custom-post-text' plugin v2.0 exhibits a strong initial security posture based on the static analysis provided. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces the plugin's attack surface, and crucially, there are no unprotected entry points. The code also demonstrates good practices by exclusively using prepared statements for SQL queries and avoiding dangerous functions, file operations, and external HTTP requests.

However, a significant concern arises from the lack of output escaping. With 100% of the identified outputs being unescaped, this creates a high risk of Cross-Site Scripting (XSS) vulnerabilities. If any user-supplied data is ever rendered on the front-end or back-end without proper sanitization, an attacker could inject malicious scripts. Additionally, the complete absence of nonce and capability checks on all entry points (though there are none currently) suggests a potential for privilege escalation or unauthorized actions should new entry points be introduced in future versions without adequate security measures.

The plugin's vulnerability history is a clear strength, with zero recorded CVEs, indicating a history of stable and secure development. This, combined with the current lack of critical or high-severity issues in taint analysis, paints a picture of a plugin that, in its current state, is relatively safe. However, the unescaped output represents a critical flaw that needs immediate attention to mitigate the risk of XSS attacks. The lack of security checks on potential future entry points is a latent risk.

Key Concerns

  • 100% of outputs unescaped
  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Custom Post Text Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom Post Text Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Custom Post Text Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentcustomposttext.php:26
actionadmin_menucustomposttext.php:77
Maintenance & Trust

Custom Post Text Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedMar 31, 2009
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom Post Text Developer Profile

ronnie268

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about Custom Post Text