Filter Search Page Security & Risk Analysis

wordpress.org/plugins/filter-search-page

This plugin will help you to filter the search page results by category and post type.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Jan 2, 2014
filtersearchwp_query
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Filter Search Page Safe to Use in 2026?

Generally Safe

Score 85/100

Filter Search Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The filter-search-page plugin v1.0 exhibits a mixed security posture, with some positive indicators but significant concerns that elevate its risk. While the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and not bundling external libraries or making HTTP requests, the lack of output escaping and the presence of an unprotected AJAX handler are critical weaknesses.

The static analysis reveals a very small attack surface, with only one entry point, an AJAX handler. However, this handler lacks any authentication or capability checks, making it a direct pathway for malicious input. The complete absence of properly escaped output further compounds this risk, as any data processed by this handler could potentially be reflected in the user's browser, leading to cross-site scripting (XSS) vulnerabilities.

The plugin's vulnerability history is clean, with no known CVEs or past vulnerabilities. This is a positive sign, suggesting that either the plugin has been developed with security in mind or has not yet been a target for attackers. However, the absence of past vulnerabilities should not be mistaken for current security. The identified issues in the static analysis, particularly the unprotected AJAX handler and unescaped output, create new, exploitable vulnerabilities that could be leveraged by attackers regardless of the plugin's history. Therefore, while the clean history is a strength, it is overshadowed by the immediate, exploitable flaws.

Key Concerns

  • AJAX handler without authentication
  • Output not properly escaped
Vulnerabilities
None known

Filter Search Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Filter Search Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface
1 unprotected

Filter Search Page Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_filter_search_page_admin_saveadmin\actions.php:19
WordPress Hooks 5
filterpre_get_postsactions.php:13
actionadmin_menuadmin\actions.php:7
actionadmin_initadmin\actions.php:10
actionadmin_print_footer_scriptsadmin\actions.php:13
actionadmin_print_stylesadmin\actions.php:16
Maintenance & Trust

Filter Search Page Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 2, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Filter Search Page Developer Profile

Alexandru Vornicescu

10 plugins · 5K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Filter Search Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/filter-search-page/css/admin.css/wp-content/plugins/filter-search-page/js/admin.js

HTML / DOM Fingerprints

CSS Classes
filter_search_page-admin-panelfilter_search_page-admin-panel-headerfilter_search_page-admin-panel-mainfilter_search_page-admin-panel-menu
FAQ

Frequently Asked Questions about Filter Search Page