Custom Post Type Maker Security & Risk Analysis

wordpress.org/plugins/custom-post-type-maker

Custom Post Type Maker lets you create Custom Post Types and custom Taxonomies in a user friendly way.

7K active installs v1.2.0 PHP + WP 3.0.0+ Updated Jul 11, 2022
customcustom-post-typecustom-post-typesposttype
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Post Type Maker Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Post Type Maker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "custom-post-type-maker" plugin v1.2.0 presents a mixed security posture. On the positive side, it exhibits strong adherence to secure coding practices regarding SQL queries, consistently utilizing prepared statements. The absence of known CVEs and a clean vulnerability history also suggest a generally stable and well-maintained codebase. However, significant concerns arise from the presence of dangerous functions, specifically "unserialize," which can be a vector for serious security issues if not handled with extreme care and proper input validation. Furthermore, the low percentage of properly escaped outputs indicates a potential for cross-site scripting (XSS) vulnerabilities, as user-supplied data might be rendered directly in the browser without adequate sanitization. The plugin's attack surface appears minimal with no publicly exposed AJAX, REST API, or shortcode entry points, and a single nonce check is present, but the lack of capability checks on this entry point is a notable weakness. While the taint analysis shows no reported issues, this may be due to the limited scope of the analysis or the plugin's specific functionalities, and the "unserialize" function remains a potent risk if exploited. In conclusion, while the plugin demonstrates good practices in areas like SQL security and boasts a clean vulnerability record, the potential for XSS due to insufficient output escaping and the inherent risks associated with "unserialize" warrant caution.

Key Concerns

  • Dangerous function: unserialize usage
  • Output escaping is not fully proper (67%)
  • No capability checks on entry points
Vulnerabilities
None known

Custom Post Type Maker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Post Type Maker Code Analysis

Dangerous Functions
6
Raw SQL Queries
0
0 prepared
Unescaped Output
35
72 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize'cptm_supports' => unserialize( $cptm_supports ),class-cptm.php:314
unserialize'cptm_builtin_taxonomies' => unserialize( $cptm_builtin_taxonomies ),class-cptm.php:315
unserialize'cptm_tax_builtin_taxonomies' => unserialize( $cptm_tax_post_types ),class-cptm.php:406
unserialize$cptm_supports = isset( $values['cptm_supports'] ) ? unserialize( $values['cptm_suppclass-cptm.php:522
unserialize$cptm_builtin_taxonomies = isset( $values['cptm_builtin_taxonomies'] ) ? unserialize( $vaclass-cptm.php:535
unserialize$cptm_tax_post_types = isset( $values['cptm_tax_post_types'] ) ? unserialize( $values['cptm_taxclass-cptm.php:882

Output Escaping

67% escaped107 total outputs
Attack Surface

Custom Post Type Maker Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actioninitclass-cptm.php:67
actioninitclass-cptm.php:68
actionadmin_menuclass-cptm.php:69
actionadmin_enqueue_scriptsclass-cptm.php:70
actionadd_meta_boxesclass-cptm.php:71
actionsave_postclass-cptm.php:72
actionadmin_initclass-cptm.php:73
actionmanage_posts_custom_columnclass-cptm.php:74
actionmanage_posts_custom_columnclass-cptm.php:75
actionadmin_footerclass-cptm.php:76
actionwp_prepare_attachment_for_jsclass-cptm.php:77
filtermanage_cptm_posts_columnsclass-cptm.php:80
filtermanage_edit-cptm_sortable_columnsclass-cptm.php:81
filtermanage_cptm_tax_posts_columnsclass-cptm.php:82
filtermanage_edit-cptm_tax_sortable_columnsclass-cptm.php:83
filterpost_updated_messagesclass-cptm.php:84
Maintenance & Trust

Custom Post Type Maker Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJul 11, 2022
PHP min version
Downloads158K

Community Trust

Rating94/100
Number of ratings18
Active installs7K
Developer Profile

Custom Post Type Maker Developer Profile

Graffino

2 plugins · 9K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Type Maker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-post-type-maker/css/overview.css/wp-content/plugins/custom-post-type-maker/js/overview.js/wp-content/plugins/custom-post-type-maker/css/add-edit.css/wp-content/plugins/custom-post-type-maker/js/add-edit.js
Version Parameters
custom-post-type-maker/js/overview.js?ver=0.0.1custom-post-type-maker/css/overview.css?ver=custom-post-type-maker/js/add-edit.js?ver=custom-post-type-maker/css/add-edit.css?ver=

HTML / DOM Fingerprints

CSS Classes
cptm-wrapcptm-add-edit-wrapcptm-post-type-optionscptm-taxonomy-options
Data Attributes
data-cptm-post-typedata-cptm-taxonomy
JS Globals
cptm_var
FAQ

Frequently Asked Questions about Custom Post Type Maker