
Featured Post Creative Security & Risk Analysis
wordpress.org/plugins/featured-post-creativeDisplay Featured post on your website with 2 shortcode and 1 widget. Also work with Gutenberg shortcode block.
Is Featured Post Creative Safe to Use in 2026?
Generally Safe
Score 98/100Featured Post Creative has a strong security track record. Known vulnerabilities have been patched promptly.
The "featured-post-creative" plugin v1.5.7 exhibits a mixed security posture. On the positive side, the static analysis reveals a relatively small attack surface with all identified entry points (AJAX handlers, shortcodes, cron events) appearing to have authentication checks. The code also demonstrates good practices regarding SQL queries, exclusively using prepared statements, and a high percentage of output escaping. Furthermore, the presence of multiple nonce and capability checks suggests an effort to secure the plugin's functionalities.
However, a significant concern arises from the presence of the `unserialize` function, which is inherently risky if not handled with extreme caution, especially when dealing with untrusted data. While the taint analysis did not reveal any unsanitized paths or critical/high severity flows, the potential for unserialize vulnerabilities cannot be ignored without deeper inspection of its usage. The vulnerability history, with two known medium-severity CVEs in the past, both related to missing authorization, indicates a recurring pattern of authorization weaknesses, even though no CVEs are currently unpatched. This history suggests a need for ongoing vigilance and thorough security reviews for this plugin.
In conclusion, while the plugin demonstrates some solid security practices like prepared statements and output escaping, the use of `unserialize` and the historical pattern of authorization vulnerabilities warrant careful consideration. The lack of unpatched CVEs is a positive sign, but the potential for future issues exists if the identified risks are not addressed. A more in-depth review of how `unserialize` is implemented would be beneficial.
Key Concerns
- Presence of the unserialize function
- History of medium severity CVEs (Missing Authorization)
Featured Post Creative Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Featured Post Creative <= 1.5.5 - Missing Authorization
Featured Post Creative <= 1.2.7 - Missing Authorization via wpfp_update_featured_post
Featured Post Creative Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Featured Post Creative Attack Surface
AJAX Handlers 1
Shortcodes 2
WordPress Hooks 31
Scheduled Events 1
Maintenance & Trust
Featured Post Creative Maintenance & Trust
Maintenance Signals
Community Trust
Featured Post Creative Developer Profile
33 plugins · 205K total installs
How We Detect Featured Post Creative
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/featured-post-creative/assets/css/wpfp-style.css/wp-content/plugins/featured-post-creative/assets/js/wpfp-scripts.js/wp-content/plugins/featured-post-creative/assets/js/blocks.build.jsfeatured-post-creative/assets/css/wpfp-style.css?ver=featured-post-creative/assets/js/wpfp-scripts.js?ver=featured-post-creative/assets/js/blocks.build.js?ver=HTML / DOM Fingerprints
wpfp-featured-postdata-wpfp-idWpfp_Block[wpfp_featured_posts][wpfp_featured_posts_grid]