WP Custom Status Manager Security & Risk Analysis

wordpress.org/plugins/hw-wp-status-manager

Create your custom statuses for the core and the custom post type (CPT)

40 active installs v1.0.5 PHP + WP 6.0.1+ Updated May 7, 2024
custompoststatustypewp
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Custom Status Manager Safe to Use in 2026?

Generally Safe

Score 92/100

WP Custom Status Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "hw-wp-status-manager" v1.0.5 plugin presents a mixed security posture. On the positive side, it has a well-defined attack surface with all identified AJAX handlers appearing to have authentication checks. The absence of known CVEs and a clean vulnerability history is a significant strength, suggesting a generally well-maintained codebase. Taint analysis also indicates no critical or high-severity unsanitized flows, which is reassuring.

However, there are several areas for concern that warrant attention. The presence of the `unserialize` function is a red flag, as it can be a vector for remote code execution if used with untrusted input. Furthermore, the plugin uses SQL queries without prepared statements, making it susceptible to SQL injection vulnerabilities. While output escaping is mostly handled, a significant portion (57%) is not properly escaped, increasing the risk of cross-site scripting (XSS) attacks. The lack of capability checks on AJAX handlers, despite the presence of nonce checks, is a potential weakness, as it might allow users with lower privileges to perform actions they shouldn't.

Overall, while the plugin has no recorded past vulnerabilities, the static analysis reveals specific coding practices that introduce inherent risks. The use of `unserialize` and raw SQL, coupled with incomplete output escaping and the absence of capability checks, suggests that while it might not have been exploited yet, it possesses vulnerabilities that could be leveraged by an attacker. Addressing these points would significantly improve its security.

Key Concerns

  • Dangerous function: unserialize used
  • SQL queries without prepared statements
  • Significant unescaped output detected
  • No capability checks on AJAX handlers
Vulnerabilities
None known

WP Custom Status Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Custom Status Manager Code Analysis

Dangerous Functions
2
Raw SQL Queries
10
0 prepared
Unescaped Output
25
19 escaped
Nonce Checks
6
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializereturn unserialize($statuses);index.php:562
unserialize$options = unserialize($wpdb->get_var("SELECT options FROM $hw_wpsm_table WHERE post_type_slug = '$pindex.php:578

SQL Query Safety

0% prepared10 total queries

Output Escaping

43% escaped44 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
hw_wp_status_manager_get_status_data_ajax (index.php:735)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Custom Status Manager Attack Surface

Entry Points6
Unprotected0

AJAX Handlers 6

authwp_ajax_hw_wpsm_delete_dataindex.php:634
authwp_ajax_hw_wpsm_save_dataindex.php:654
authwp_ajax_hw_wpsm_save_data_optionsindex.php:688
authwp_ajax_hw_wpsm_get_statuses_listindex.php:704
authwp_ajax_hw_wpsm_get_status_dataindex.php:734
authwp_ajax_hw_wpsm_reset_plugin_dataindex.php:752
WordPress Hooks 7
actionplugins_loadedindex.php:41
actionadmin_menuindex.php:91
actionadmin_initindex.php:467
actionadmin_footer-edit.phpindex.php:535
actionadmin_footer-post.phpindex.php:536
actionadmin_footer-post-new.phpindex.php:537
actionadmin_headindex.php:554
Maintenance & Trust

WP Custom Status Manager Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 7, 2024
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs40
Developer Profile

WP Custom Status Manager Developer Profile

giangel84

5 plugins · 1K total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Custom Status Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hw-wp-status-manager/css/hw-wp-status-manager-admin.css/wp-content/plugins/hw-wp-status-manager/js/hw-wp-status-manager-admin.js
Script Paths
/wp-content/plugins/hw-wp-status-manager/js/hw-wp-status-manager-admin.js
Version Parameters
hw-wp-status-manager/css/hw-wp-status-manager-admin.css?ver=hw-wp-status-manager/js/hw-wp-status-manager-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
hw-wpsm-cpthw-wpsm-hcshw-wpsm-csopen-optionsset-hide-core-statusedit-statuslist-statuses-hw-wpsm-reset+2 more
Data Attributes
data-slugdata-cptdata-value
JS Globals
hw_wp_status_manager_admin_page
FAQ

Frequently Asked Questions about WP Custom Status Manager