Custom Post Type Cleanup Security & Risk Analysis

wordpress.org/plugins/custom-post-type-cleanup

Detect and delete posts from custom post types that are no longer in use

1K active installs v1.3.2 PHP + WP 5.9+ Updated Apr 20, 2024
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Post Type Cleanup Safe to Use in 2026?

Generally Safe

Score 92/100

Custom Post Type Cleanup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin 'custom-post-type-cleanup' v1.3.2 demonstrates a generally strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events that present an attack surface, and crucially, none of these are unprotected. The absence of dangerous functions, file operations, and external HTTP requests further strengthens its security. The code also utilizes prepared statements for all SQL queries and includes nonce and capability checks, which are good security practices. However, a significant concern arises from the low percentage (42%) of properly escaped output. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, as unsanitized output could be injected and rendered by the browser.

The taint analysis reveals no identified flows, which is a positive indicator, suggesting no obvious data injection vulnerabilities. The vulnerability history is also clean, with no known CVEs, which is excellent. Despite the lack of historical vulnerabilities and a clean taint analysis, the poor output escaping is a tangible risk that needs to be addressed. While the plugin has strengths in its minimal attack surface and secure data handling for SQL, the output escaping weakness represents a notable area of concern that could be exploited by attackers.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Custom Post Type Cleanup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Post Type Cleanup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
11
8 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared5 total queries

Output Escaping

42% escaped19 total outputs
Attack Surface

Custom Post Type Cleanup Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuincludes\class-post-type-cleanup.php:24
actioninitincludes\register-post-type.php:3
actionadmin_noticesincludes\register-post-type.php:49
Maintenance & Trust

Custom Post Type Cleanup Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedApr 20, 2024
PHP min version
Downloads27K

Community Trust

Rating100/100
Number of ratings35
Active installs1K
Alternatives

Custom Post Type Cleanup Alternatives

No alternatives data available yet.

Developer Profile

Custom Post Type Cleanup Developer Profile

keesiemeijer

6 plugins · 11K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Type Cleanup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-post-type-cleanup/js/custom-post-type-cleanup.js
Script Paths
/wp-content/plugins/custom-post-type-cleanup/js/custom-post-type-cleanup.js

HTML / DOM Fingerprints

JS Globals
cptc_plugin
FAQ

Frequently Asked Questions about Custom Post Type Cleanup