Filter Admin Published Default Security & Risk Analysis

wordpress.org/plugins/filter-admin-published-default

Enables all public post types (posts, pages, etc) in wp-admin to show the Published filter by default.

400 active installs v2.0.0 PHP + WP 5.2+ Updated Mar 10, 2026
adminedit-linkpages-editposts-editpublished
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Filter Admin Published Default Safe to Use in 2026?

Generally Safe

Score 100/100

Filter Admin Published Default has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin 'filter-admin-published-default' v2.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, dangerous functions, SQL queries without prepared statements, unescaped output, file operations, external HTTP requests, and taint analysis findings with unsanitized paths indicates that the developers have followed robust secure coding practices. The lack of any recorded vulnerabilities, past or present, further reinforces this positive assessment, suggesting a well-maintained and secure codebase.

However, the analysis does highlight a significant area of concern: the complete absence of nonce checks and capability checks across all potential entry points (even though there are none reported). While the current lack of an attack surface mitigates immediate risk, this omission represents a potential future vulnerability if the plugin's functionality were to expand or if new entry points were introduced without corresponding security measures. This is a weakness in the defensive depth of the plugin's design.

In conclusion, the plugin is currently very secure due to its limited functionality and adherence to secure coding for the existing code. The primary weakness lies in the lack of fundamental security checks (nonces and capabilities), which, while not currently exploitable, could become a significant risk if the plugin evolves. The plugin's history of zero vulnerabilities is a strong positive indicator, but the lack of foundational security checks is a notable oversight that warrants attention.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Filter Admin Published Default Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Filter Admin Published Default Release Timeline

v2.0.0Current
v1.3
v1.2
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Filter Admin Published Default Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Filter Admin Published Default Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menufilter-admin-published-default.php:56
Maintenance & Trust

Filter Admin Published Default Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 10, 2026
PHP min version
Downloads6K

Community Trust

Rating88/100
Number of ratings7
Active installs400
Developer Profile

Filter Admin Published Default Developer Profile

Chuck Reynolds

4 plugins · 5K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Filter Admin Published Default

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Filter Admin Published Default