Find Posts Using Attachment Security & Risk Analysis

wordpress.org/plugins/find-posts-using-attachment

Allows to find all posts where a particular attachment is used.

1K active installs v1.0 PHP 5.2.4+ WP 3.5+ Updated Jun 1, 2021
attachmentimagemediaposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Find Posts Using Attachment Safe to Use in 2026?

Generally Safe

Score 85/100

Find Posts Using Attachment has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the provided static analysis, the "find-posts-using-attachment" v1.0 plugin exhibits a generally strong security posture. The plugin has no identified CVEs in its history and demonstrates good practices by not utilizing dangerous functions, avoiding raw SQL queries in favor of prepared statements, and having no external HTTP requests or file operations. The attack surface is zero, meaning there are no direct entry points like AJAX handlers, REST API routes, or shortcodes, which significantly reduces the potential for exploitation.

However, there are a couple of areas that warrant attention. The static analysis reports one output that is not properly escaped. While the taint analysis shows no unsanitized paths, unescaped output can still lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is reflected directly in the output without sanitization. Additionally, the plugin has one capability check but no nonce checks are identified. While the lack of direct entry points mitigates the risk of direct nonce bypass, the absence of nonce checks on any potential (even if not immediately apparent) administrative actions could be a weakness if the plugin were to evolve or if unexpected interactions occurred.

Overall, the plugin is in a good state, with the primary concern being the unescaped output. The absence of historical vulnerabilities and a minimal attack surface are significant strengths. The lack of identified taint flows and dangerous functions further bolsters its security. The recommendations would be to address the unescaped output to prevent potential XSS and to consider implementing nonce checks if any administrative functionalities are present or planned.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

Find Posts Using Attachment Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Find Posts Using Attachment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Find Posts Using Attachment Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedfind-posts-using-attachment.php:15
filterattachment_fields_to_editfind-posts-using-attachment.php:17
filtermanage_media_columnsfind-posts-using-attachment.php:19
actionmanage_media_custom_columnfind-posts-using-attachment.php:20
Maintenance & Trust

Find Posts Using Attachment Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJun 1, 2021
PHP min version5.2.4
Downloads13K

Community Trust

Rating88/100
Number of ratings27
Active installs1K
Developer Profile

Find Posts Using Attachment Developer Profile

Sergey Biryukov

23 plugins · 313K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Find Posts Using Attachment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<strong></strong>, <br />(as Featured Image and in content)
FAQ

Frequently Asked Questions about Find Posts Using Attachment