Filtering Post Security & Risk Analysis

wordpress.org/plugins/filtering-post

A filtering Plugin to show contents per category nicely

10 active installs v1.0 PHP + WP 4.0+ Updated Jun 23, 2016
isotopelikenicelypostshow
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Filtering Post Safe to Use in 2026?

Generally Safe

Score 85/100

Filtering Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "filtering-post" plugin v1.0 demonstrates a strong security posture in several key areas. It has no known vulnerabilities, no dangerous functions, and all SQL queries are properly prepared. Furthermore, there are no external HTTP requests or file operations, and it correctly implements nonce and capability checks on its single entry point (a shortcode). This indicates good development practices concerning common attack vectors like SQL injection and cross-site scripting (XSS) via direct code execution or insecure database interactions. The absence of any recorded vulnerabilities in its history also suggests a well-maintained and secure codebase.

However, the plugin exhibits a significant weakness in output escaping. With only 21% of its 19 outputs properly escaped, there is a high risk of stored or reflected XSS vulnerabilities. This means that user-supplied data, if not sanitized before display, could be executed as JavaScript in the browser of other users interacting with the plugin's output. While the attack surface is small and protected, this lack of proper output sanitization represents a critical security concern that could be easily exploited. The plugin's strengths in other areas are overshadowed by this significant oversight in handling user-generated content.

In conclusion, while "filtering-post" v1.0 benefits from a minimal attack surface and the absence of known vulnerabilities and dangerous code patterns, its poor handling of output escaping presents a substantial security risk. The plugin developers have implemented crucial security checks for data persistence and entry points, but they have failed to adequately protect against XSS through improper output sanitization. This balance of good practices and a critical flaw necessitates careful consideration for any WordPress site utilizing this plugin.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Filtering Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Filtering Post Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Filtering Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
4 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

21% escaped19 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

1 flows
<optionsfp> (inc/optionsfp.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Filtering Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[fptoshow] inc/class_fp.php:13
WordPress Hooks 8
actionadmin_menuinc/class_fp.php:10
actionwp_enqueue_scriptsinc/class_fp.php:11
actionadmin_enqueue_scriptsinc/class_fp.php:12
filterplugin_row_metainc/class_fp.php:14
filterplugin_action_links_filtering-post/fp_plugin.phpinc/class_fp.php:15
filterterms_clausesinc/optionsfp.php:71
filterget_terminc/optionsfp.php:72
filterget_terms_argsinc/optionsfp.php:73
Maintenance & Trust

Filtering Post Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJun 23, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Filtering Post Developer Profile

Eric Zeidan

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Filtering Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/filtering-post/js/fp_script.js/wp-content/plugins/filtering-post/js/jquery.filterizr.js/wp-content/plugins/filtering-post/js/bootstrap.min.js/wp-content/plugins/filtering-post/css/bootstrap.min.css/wp-content/plugins/filtering-post/css/fpstyle.css/wp-content/plugins/filtering-post/js/adminscript.js/wp-content/plugins/filtering-post/css/adminstyle.css

HTML / DOM Fingerprints

Shortcode Output
showpost-template.php
FAQ

Frequently Asked Questions about Filtering Post