
Custom Post Type Privacy Security & Risk Analysis
wordpress.org/plugins/custom-post-type-privacyStable Tag 0.3 Custom Post Type Privacy allows WordPress authors to grant access to users and groups of users across all posts, pages and custom post …
Is Custom Post Type Privacy Safe to Use in 2026?
Generally Safe
Score 85/100Custom Post Type Privacy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The custom-post-type-privacy plugin v0.3 presents a mixed security profile. On one hand, the absence of known CVEs and a clean vulnerability history suggest a generally stable and well-maintained codebase. The static analysis also indicates a limited attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events, all of which are positive indicators. Furthermore, the presence of capability checks is a good practice for restricting access to sensitive functionality.
However, significant concerns arise from the code analysis. A substantial percentage of SQL queries (82%) are not using prepared statements, which is a serious risk for SQL injection vulnerabilities. The output escaping is also very poor, with only 8% of outputs properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals 5 flows with unsanitized paths, indicating potential vulnerabilities that could be exploited if an attacker can manipulate input that reaches these un-sanitized paths. The complete absence of nonce checks is also a notable weakness, especially given that even with a small attack surface, potential vulnerabilities could be chained.
In conclusion, while the plugin lacks a history of publicly disclosed vulnerabilities and has a small attack surface, the internal code quality raises significant red flags. The heavy reliance on raw SQL queries and insufficient output escaping are critical weaknesses that expose the plugin and, by extension, the WordPress site to substantial risks of data compromise and malicious code execution. The presence of unsanitized taint flows further exacerbates these risks.
Key Concerns
- High percentage of SQL queries without prepared statements
- Low percentage of properly escaped output
- Taint flows with unsanitized paths
- Zero nonce checks
Custom Post Type Privacy Security Vulnerabilities
Custom Post Type Privacy Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Custom Post Type Privacy Attack Surface
WordPress Hooks 30
Maintenance & Trust
Custom Post Type Privacy Maintenance & Trust
Maintenance Signals
Community Trust
Custom Post Type Privacy Alternatives
No Page Comment
no-page-comment
An admin interface to control the default comment and trackback settings on new posts, pages and custom post types.
Posts in Page
posts-in-page
Easily add one or more posts to any page using simple shortcodes.
Author Filters
author-filters
Author filters plugin integrates an author filter drop down to sort listing on post, page, custom post type in admin.
Search by ID
search-by-id
Enables the user to search by post ID using the built-in search within the control panel. Works for all kinds of posts.
ClonePress – Duplicate Pages, Posts & Custom Post Types
clonepress
Easily duplicate posts, pages, and custom post types with a single click.
Custom Post Type Privacy Developer Profile
2 plugins · 1K total installs
How We Detect Custom Post Type Privacy
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/custom-post-type-privacy/cpt-sentry-widgets.php/wp-content/plugins/custom-post-type-privacy/css/cpt-sentry.css/wp-content/plugins/custom-post-type-privacy/js/cpt-sentry.js/wp-content/plugins/custom-post-type-privacy/js/cpt-sentry.jscustom-post-type-privacy/css/cpt-sentry.css?ver=custom-post-type-privacy/js/cpt-sentry.js?ver=HTML / DOM Fingerprints
cpt_sentry_user_groupscpt_sentry_users<!-- WP CPT Sentry Database schema versioning --><!-- Name of the Database Table --><!-- For outputting results to the user --><!-- Keys for the Users/posts meta-data -->+25 morecpt_sentry_groupscpt_sentry_userswp_cpt_sentry