Custom post type templates for Elementor Security & Risk Analysis

wordpress.org/plugins/custom-post-type-templates-for-elementor

With the help of this plug-in you can link you posts or a custom post type detail pages to a normal Elementor page. You can style that Elementor page …

700 active installs v2.0.1 PHP 7.2+ WP 5.2+ Updated Feb 5, 2025
elementorelementor-widgetposttypetemplateswidgets
91
A · Safe
CVEs total1
Unpatched0
Last CVENov 1, 2024
Download
Safety Verdict

Is Custom post type templates for Elementor Safe to Use in 2026?

Generally Safe

Score 91/100

Custom post type templates for Elementor has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 1, 2024Updated 1yr ago
Risk Assessment

The plugin "custom-post-type-templates-for-elementor" v2.0.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, all of which are prepared statements, and it has no known unpatched vulnerabilities. The code also shows a relatively high rate of output escaping, with 75% of outputs properly handled, and no critical or high-severity taint flows were detected, indicating a general effort to prevent common vulnerabilities. However, significant concerns arise from the attack surface analysis. The plugin exposes two AJAX handlers, and critically, both lack authentication checks. This means any unauthenticated user could potentially interact with these handlers, leading to unintended actions or information disclosure.

The vulnerability history, while showing no currently unpatched CVEs, does indicate a past medium vulnerability related to Cross-Site Scripting. The fact that the last vulnerability was recent (November 2024) suggests that the plugin, in its past iterations, has had exploitable flaws, even if they are now addressed. The absence of nonce checks on AJAX handlers is a direct contributor to the potential for Cross-Site Request Forgery (CSRF) attacks, especially given the unauthenticated entry points.

In conclusion, while the plugin has strengths in its handling of SQL and output escaping, the presence of two unprotected AJAX entry points is a serious security weakness that significantly increases the risk of exploitation. The past XSS vulnerability, although patched, also serves as a reminder of potential risks. Addressing the unauthenticated AJAX handlers and implementing nonce checks should be a high priority.

Key Concerns

  • AJAX handlers without authentication checks
  • Missing nonce checks on AJAX handlers
  • Past medium severity XSS vulnerability
  • High percentage of unescaped outputs
Vulnerabilities
1

Custom post type templates for Elementor Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-51683medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Custom post type templates for Elementor <= 1.10.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Nov 1, 2024 Patched in 1.1.12 (25d)
Code Analysis
Analyzed Mar 16, 2026

Custom post type templates for Elementor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
63 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped84 total outputs
Attack Surface
2 unprotected

Custom post type templates for Elementor Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_miga_custom_post_filtermiga_custom_posts.php:306
noprivwp_ajax_miga_custom_post_filtermiga_custom_posts.php:307
WordPress Hooks 11
filtersingle_templatemiga_custom_posts.php:65
filterrequestmiga_custom_posts.php:82
actioninitmiga_custom_posts.php:244
actionwp_enqueue_scriptsmiga_custom_posts.php:298
actionadmin_initmiga_custom_posts.php:299
actioninitmiga_custom_posts.php:300
actionadmin_menumiga_custom_posts.php:301
actionadmin_enqueue_scriptsmiga_custom_posts.php:302
actionelementor/elements/categories_registeredmiga_custom_posts.php:303
filterquery_varsmiga_custom_posts.php:304
filterdocument_title_partsmiga_custom_posts.php:321
Maintenance & Trust

Custom post type templates for Elementor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 5, 2025
PHP min version7.2
Downloads9K

Community Trust

Rating80/100
Number of ratings4
Active installs700
Developer Profile

Custom post type templates for Elementor Developer Profile

Michael

7 plugins · 10K total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Custom post type templates for Elementor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-post-type-templates-for-elementor/styles/main.css/wp-content/plugins/custom-post-type-templates-for-elementor/scripts/main.js
Script Paths
/wp-content/plugins/custom-post-type-templates-for-elementor/scripts/main.js
Version Parameters
custom-post-type-templates-for-elementor/styles/main.css?ver=custom-post-type-templates-for-elementor/scripts/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
miga_custom_posts
Data Attributes
id="miga_custom_post_type_0"name="miga_custom_posts[0][1]"id="miga_custom_post_id_0"name="miga_custom_posts[0][0]"id="miga_custom_post_type_1"name="miga_custom_posts[1][1]"+6 more
JS Globals
objectL10n
FAQ

Frequently Asked Questions about Custom post type templates for Elementor