DCO Post Validator Security & Risk Analysis

wordpress.org/plugins/dco-post-validator

Allows you to make post, page, custom post elements required: title, content, featured image.

20 active installs v1.1.0 PHP + WP 4.6+ Updated May 27, 2020
postrequirerequiredvalidation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is DCO Post Validator Safe to Use in 2026?

Generally Safe

Score 85/100

DCO Post Validator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of the 'dco-post-validator' v1.1.0 plugin reveals a seemingly strong security posture, with no identified attack surface through AJAX, REST API, shortcodes, or cron events. The absence of dangerous functions and file operations is also a positive sign. Furthermore, all SQL queries utilize prepared statements, indicating good database interaction practices. The plugin also has no recorded vulnerability history, including CVEs, which suggests a stable and well-maintained codebase.

However, a significant concern arises from the output escaping analysis, which indicates that 100% of the identified outputs are not properly escaped. This presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities, as unescaped output can allow malicious scripts to be injected and executed in the user's browser. While the attack surface is zero and there are no identified taint flows or dangerous functions, the lack of output escaping creates a critical security gap that requires immediate attention. The absence of capability checks and nonce checks, though not directly flagged as problematic due to the lack of entry points, still represents a lack of defense-in-depth for any future potential expansion of the plugin's functionality.

In conclusion, while the 'dco-post-validator' plugin exhibits strengths in its limited attack surface and secure database practices, the complete lack of output escaping is a severe weakness that significantly elevates the risk profile. The vulnerability history being clean is encouraging, but it does not negate the immediate threat posed by unescaped output. Addressing this single but critical flaw should be the highest priority.

Key Concerns

  • 100% of outputs are unescaped
  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

DCO Post Validator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

DCO Post Validator Release Timeline

v1.1.0Current
v1.0.1
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

DCO Post Validator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

DCO Post Validator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitclass.dco-pv-admin.php:21
actionadmin_initclass.dco-pv-admin.php:27
actionadmin_menuclass.dco-pv-admin.php:28
filterplugin_row_metaclass.dco-pv-admin.php:31
actioninitclass.dco-pv.php:7
actionadmin_enqueue_scriptsclass.dco-pv.php:13
actionadmin_noticesclass.dco-pv.php:14
Maintenance & Trust

DCO Post Validator Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 27, 2020
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

DCO Post Validator Developer Profile

Denis Yanchevskiy

6 plugins · 13K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DCO Post Validator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dco-post-validator/js/dco-post-validator-gutenberg.js/wp-content/plugins/dco-post-validator/js/dco-post-validator.js
Script Paths
/wp-content/plugins/dco-post-validator/js/dco-post-validator-gutenberg.js/wp-content/plugins/dco-post-validator/js/dco-post-validator.js
Version Parameters
/wp-content/plugins/dco-post-validator/js/dco-post-validator-gutenberg.js?ver=/wp-content/plugins/dco-post-validator/js/dco-post-validator.js?ver=

HTML / DOM Fingerprints

CSS Classes
dco-pv-validation-errordco-pv-featured-errordco-pv-title-errordco-pv-content-error
Data Attributes
name="dco_pv[value="0"value="1"
JS Globals
dcopv
FAQ

Frequently Asked Questions about DCO Post Validator