Force Delete Posts Security & Risk Analysis

wordpress.org/plugins/force-delete-posts

Deleting Posts has never been so fast! This lightweight plugin adds the ability for administrators to instantly delete posts by adding a Force Delete …

300 active installs v2.1.1 PHP 5.6+ WP 4.0.0+ Updated Dec 23, 2025
deleteforcepostpoststrash
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Force Delete Posts Safe to Use in 2026?

Generally Safe

Score 100/100

Force Delete Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "force-delete-posts" v2.1.1 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the lack of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries indicate robust coding practices. The plugin also demonstrates some security awareness with a capability check present.

However, a significant concern arises from the output escaping. With one output detected and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data or dynamic content is reflected directly in the output. While the taint analysis shows no critical or high severity flows, this is likely due to the very limited attack surface. The clean vulnerability history is positive, suggesting the plugin has historically been well-maintained or has not attracted malicious attention, but it doesn't negate the identified coding issues.

In conclusion, while the plugin's architecture is secure and its vulnerability history is clean, the unescaped output is a critical flaw that needs immediate attention. Addressing this XSS risk is paramount to ensuring the plugin's overall security.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

Force Delete Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Force Delete Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Force Delete Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptsadmin\forceDeletePosts.php:11
filtermanage_pages_columnsadmin\forceDeletePosts.php:14
actionmanage_pages_custom_columnadmin\forceDeletePosts.php:15
filtermanage_posts_columnsadmin\forceDeletePosts.php:18
actionmanage_posts_custom_columnadmin\forceDeletePosts.php:19
actionbefore_delete_postadmin\forceDeletePosts.php:22
Maintenance & Trust

Force Delete Posts Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 23, 2025
PHP min version5.6
Downloads9K

Community Trust

Rating88/100
Number of ratings7
Active installs300
Developer Profile

Force Delete Posts Developer Profile

Liam Stewart

1 plugin · 300 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Force Delete Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/force-delete-posts/styles.css
Version Parameters
force-delete-posts/styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
ls_fd_label
FAQ

Frequently Asked Questions about Force Delete Posts