Go to Post ID Security & Risk Analysis

wordpress.org/plugins/go-to-post-id

Provide input in admin bar to jump to edit post page by post ID. Only users that can "edit_posts" will see it.

10 active installs v1.1 PHP 7.4+ WP 4.4+ Updated Aug 16, 2025
ease-of-accesspost
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Go to Post ID Safe to Use in 2026?

Generally Safe

Score 100/100

Go to Post ID has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "go-to-post-id" plugin v1.1 exhibits a strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code analysis reveals no dangerous functions, no direct SQL queries (all use prepared statements), no file operations, and no external HTTP requests. This indicates a generally well-written and secure codebase, with good practices employed in critical areas like database interaction. The presence of one capability check and a high percentage of properly escaped output further bolster its security.

However, a notable concern is the complete absence of nonce checks. While the attack surface is currently zero, this is a fundamental WordPress security mechanism that should always be implemented on any entry points that could potentially handle user-submitted data or state-changing actions, even if none are present in this specific version. The taint analysis shows zero flows, which is excellent, but this is likely a consequence of the limited attack surface rather than a guarantee that complex data flows would be handled securely if introduced. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign of its past security and maintenance. The strengths of this plugin lie in its minimal attack surface and use of secure coding practices for database operations. Its primary weakness is the lack of nonce checks, which is a missed opportunity for robust security, especially if future versions introduce more functionality.

Key Concerns

  • Missing nonce checks on potential entry points
Vulnerabilities
None known

Go to Post ID Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Go to Post ID Release Timeline

v1.1Current
v1.0
v0.2
Code Analysis
Analyzed Mar 17, 2026

Go to Post ID Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

Go to Post ID Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_bar_menugo-to-post-id.php:30
actionadmin_noticessrc\error-handling\unsupported-php-version.php:25
filterafter_plugin_row_metasrc\error-handling\unsupported-php-version.php:46
Maintenance & Trust

Go to Post ID Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 16, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Go to Post ID Developer Profile

Matej Kravjar

4 plugins · 610 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Go to Post ID

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
go-to-post-id
FAQ

Frequently Asked Questions about Go to Post ID