Filter Post Types by Taxonomy Security & Risk Analysis

wordpress.org/plugins/filter-post-types-by-taxonomy

Quickly filter posts by taxonomy on your admin screens!

20 active installs v1.0.0 PHP + WP 4.3+ Updated Sep 2, 2015
adminfilteringtaxonomies
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Filter Post Types by Taxonomy Safe to Use in 2026?

Generally Safe

Score 85/100

Filter Post Types by Taxonomy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin 'filter-post-types-by-taxonomy' v1.0.0 exhibits a seemingly strong security posture based on the static analysis. There are no identified attack surface points like AJAX handlers, REST API routes, or shortcodes, and no dangerous functions, file operations, or external HTTP requests were detected. All SQL queries are using prepared statements, which is a positive indicator of secure data handling. The vulnerability history is also clean, with no recorded CVEs, suggesting a history of stable and secure development.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, this indicates a critical weakness. Any data processed or generated by the plugin and displayed to users could be vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce checks and capability checks, while not directly flagged as attack surface points, means that even if functionalities were added in the future, they might lack essential security measures. The fact that taint analysis shows no flows is positive but might also be a result of a very limited plugin scope or minimal code complexity.

In conclusion, while the plugin appears robust in preventing direct code injection or unauthorized access through common entry points and database vulnerabilities, the complete lack of output escaping presents a serious XSS risk. This weakness, coupled with the absence of capability and nonce checks, overshadows the otherwise clean code and vulnerability history. Developers should prioritize implementing proper output sanitization before this plugin is deployed in a production environment.

Key Concerns

  • 0% output escaping
  • 0 capability checks
  • 0 nonce checks
Vulnerabilities
None known

Filter Post Types by Taxonomy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Filter Post Types by Taxonomy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Filter Post Types by Taxonomy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionrestrict_manage_postsinc\FilterEntriesByTaxonomy.php:15
filterparse_queryinc\FilterEntriesByTaxonomy.php:16
Maintenance & Trust

Filter Post Types by Taxonomy Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedSep 2, 2015
PHP min version
Downloads2K

Community Trust

Rating70/100
Number of ratings2
Active installs20
Developer Profile

Filter Post Types by Taxonomy Developer Profile

Ionut Staicu

3 plugins · 340 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Filter Post Types by Taxonomy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Filter Post Types by Taxonomy