Display A Post Security & Risk Analysis

wordpress.org/plugins/display-a-post

This is a super simple plugin that displays a specific post by post name (slug) or id. This plugin is very light weight and easy to use in pages, post …

10 active installs v1.1 PHP + WP 2.0+ Updated Sep 22, 2015
displaydisplay-postgetget-postpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Display A Post Safe to Use in 2026?

Generally Safe

Score 85/100

Display A Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'display-a-post' plugin v1.1 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries executed via prepared statements, and properly escaped output are excellent indicators of good development practices. The fact that all identified code signals (SQL, output) are handled securely mitigates common web application vulnerabilities.

However, the analysis reveals a significant concern regarding the lack of any explicit security checks on its entry points. With one shortcode identified as the sole entry point, the absence of nonce checks and capability checks is a notable weakness. While there are no AJAX handlers or REST API routes to assess for authentication, the shortcode's functionality could potentially be exploited if it processes user-supplied data in any way without proper validation or authorization. The plugin's vulnerability history being entirely clean is a positive sign, suggesting the developers have historically prioritized security. Nevertheless, the current lack of authorization on the shortcode remains a point of potential risk.

In conclusion, while the plugin is built with sound coding practices concerning data handling and query execution, the absence of security checks on its shortcode presents a tangible risk. The clean vulnerability history is encouraging, but it doesn't negate the immediate concern of an unprotected entry point. Developers should prioritize implementing nonce and capability checks for the shortcode to ensure it can only be executed by authorized users and prevent potential misuse.

Key Concerns

  • Shortcode without nonce checks
  • Shortcode without capability checks
Vulnerabilities
None known

Display A Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Display A Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Display A Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[get-post] index.php:66
Maintenance & Trust

Display A Post Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 22, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Display A Post Developer Profile

jd7777

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Display A Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
get-post-content-titlepostread-more-guid
Shortcode Output
<div class="get-post-content-</h3><div class="post" style="color:<em><a class="read-more-guid" href="
FAQ

Frequently Asked Questions about Display A Post