
Filtering Post Security & Risk Analysis
wordpress.org/plugins/filtering-postA filtering Plugin to show contents per category nicely
Is Filtering Post Safe to Use in 2026?
Generally Safe
Score 85/100Filtering Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "filtering-post" plugin v1.0 demonstrates a strong security posture in several key areas. It has no known vulnerabilities, no dangerous functions, and all SQL queries are properly prepared. Furthermore, there are no external HTTP requests or file operations, and it correctly implements nonce and capability checks on its single entry point (a shortcode). This indicates good development practices concerning common attack vectors like SQL injection and cross-site scripting (XSS) via direct code execution or insecure database interactions. The absence of any recorded vulnerabilities in its history also suggests a well-maintained and secure codebase.
However, the plugin exhibits a significant weakness in output escaping. With only 21% of its 19 outputs properly escaped, there is a high risk of stored or reflected XSS vulnerabilities. This means that user-supplied data, if not sanitized before display, could be executed as JavaScript in the browser of other users interacting with the plugin's output. While the attack surface is small and protected, this lack of proper output sanitization represents a critical security concern that could be easily exploited. The plugin's strengths in other areas are overshadowed by this significant oversight in handling user-generated content.
In conclusion, while "filtering-post" v1.0 benefits from a minimal attack surface and the absence of known vulnerabilities and dangerous code patterns, its poor handling of output escaping presents a substantial security risk. The plugin developers have implemented crucial security checks for data persistence and entry points, but they have failed to adequately protect against XSS through improper output sanitization. This balance of good practices and a critical flaw necessitates careful consideration for any WordPress site utilizing this plugin.
Key Concerns
- Low percentage of properly escaped output
Filtering Post Security Vulnerabilities
Filtering Post Release Timeline
Filtering Post Code Analysis
Output Escaping
Data Flow Analysis
Filtering Post Attack Surface
Shortcodes 1
WordPress Hooks 8
Maintenance & Trust
Filtering Post Maintenance & Trust
Maintenance Signals
Community Trust
Filtering Post Alternatives
Depicter — Popup & Slider Builder
depicter
Build Stunning Slider and Popup. Exit intent Popup, Image slider carousel, video slider carousel, post slider carousel, product slider, promote popup
WP Show Posts
wp-show-posts
Add posts to your website from any post type using a simple shortcode.
Themify Portfolio Post
themify-portfolio-post
Add a simple Portfolio post type to your site.
Hide Posts
whp-hide-posts
Allows you to hide any posts on the home page, category page, search page, tags page, authors page, RSS Feed, REST API, XML sitemaps, SEO integrations …
Hide Featured Image
hide-featured-image
To Hide Featured Image on single post/page.
Filtering Post Developer Profile
5 plugins · 50 total installs
How We Detect Filtering Post
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/filtering-post/js/fp_script.js/wp-content/plugins/filtering-post/js/jquery.filterizr.js/wp-content/plugins/filtering-post/js/bootstrap.min.js/wp-content/plugins/filtering-post/css/bootstrap.min.css/wp-content/plugins/filtering-post/css/fpstyle.css/wp-content/plugins/filtering-post/js/adminscript.js/wp-content/plugins/filtering-post/css/adminstyle.cssHTML / DOM Fingerprints
showpost-template.php