Express Posts Security & Risk Analysis

wordpress.org/plugins/express-posts

Express posts provides a widget to display either a subset of posts, the children of a page or its siblings.

10 active installs v1.3.0 PHP + WP 3.2.1+ Updated Apr 13, 2016
childrenpagespostssidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Express Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Express Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of express-posts v1.3.0 reveals an exceptionally clean attack surface with zero identified entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. This suggests a well-contained plugin architecture. The code also demonstrates good practices by exclusively using prepared statements for all SQL queries and avoiding file operations and external HTTP requests. However, a significant concern arises from the low percentage of properly escaped output (14%). This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data could be rendered directly in the browser without proper sanitization.

The absence of any recorded CVEs and no history of vulnerabilities is a positive indicator. Combined with the zero taint flows, this suggests the plugin has historically been developed with security in mind or has not yet been subjected to extensive security audits that would uncover deeper issues. Despite the lack of known vulnerabilities and a minimal attack surface, the poor output escaping is a critical weakness that leaves the plugin susceptible to XSS attacks. Therefore, while the plugin has strengths in its limited attack surface and SQL handling, the unescaped output represents a significant security risk that must be addressed.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

Express Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Express Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
54
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

14% escaped63 total outputs
Attack Surface

Express Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_print_scripts-widgets.phpexpress-posts.php:33
actionwidgets_initexpress-posts.php:320
Maintenance & Trust

Express Posts Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 13, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Express Posts Developer Profile

Grant Mangham

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Express Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/express-posts/express-posts.js
Script Paths
/wp-content/plugins/express-posts/express-posts.js
Version Parameters
express-posts/express-posts.js?ver=

HTML / DOM Fingerprints

CSS Classes
express_posts-subsetexpress_posts-childrenexpress_posts-siblings
Data Attributes
id="express_posts-1"id="express_posts-2"id="express_posts-3"
Shortcode Output
<div class="footer">
FAQ

Frequently Asked Questions about Express Posts