I Order Terms Security & Risk Analysis

wordpress.org/plugins/i-order-terms

Allows theme developers to add order/sort functionality for categories, tags and custom taxonomies.

1K active installs v1.5.3 PHP 5.6+ WP 3.5+ Updated Dec 14, 2025
ordersorttaxonomyterms
99
A · Safe
CVEs total1
Unpatched0
Last CVEOct 30, 2025
Safety Verdict

Is I Order Terms Safe to Use in 2026?

Generally Safe

Score 99/100

I Order Terms has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 30, 2025Updated 3mo ago
Risk Assessment

The i-order-terms plugin version 1.5.3 exhibits a generally good security posture, with several positive indicators such as 100% of SQL queries using prepared statements and the presence of nonce and capability checks. The static analysis reveals a small attack surface with no immediately apparent unprotected entry points. File operations and external HTTP requests are also absent, which reduces potential attack vectors. However, a notable concern is that only 71% of output is properly escaped, leaving room for potential Cross-Site Scripting (XSS) vulnerabilities if the unescaped outputs are triggered by user-supplied data.

The vulnerability history shows one past medium-severity CVE, which was a Cross-Site Request Forgery (CSRF) vulnerability, and importantly, it is currently patched. This suggests that while vulnerabilities have existed, they have been addressed by the developers. The lack of critical or high-severity taint flows and dangerous functions in the static analysis is reassuring, indicating that the core code is likely not introducing inherent, severe risks. The absence of bundled libraries is also a positive as it avoids potential vulnerabilities from outdated dependencies.

In conclusion, i-order-terms v1.5.3 demonstrates strong adherence to several security best practices, particularly in database interaction and access control. The primary area for improvement lies in ensuring complete output escaping to mitigate XSS risks. The past CSRF vulnerability, now patched, indicates developer responsiveness to security issues. Overall, the plugin is in a relatively good security state, but the incomplete output escaping warrants attention.

Key Concerns

  • Incomplete output escaping
Vulnerabilities
1

I Order Terms Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-66097medium · 4.3Cross-Site Request Forgery (CSRF)

I Order Terms <= 1.5.0 - Cross-Site Request Forgery

Oct 30, 2025 Patched in 1.5.1 (27d)
Code Analysis
Analyzed Mar 16, 2026

I Order Terms Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
7 prepared
Unescaped Output
4
10 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared7 total queries

Output Escaping

71% escaped14 total outputs
Attack Surface

I Order Terms Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_i-order-termscode\class-i-order-terms.php:65
WordPress Hooks 8
actionafter_setup_themecode\class-i-order-terms.php:51
filterterms_clausescode\class-i-order-terms.php:53
actionregistered_taxonomycode\class-i-order-terms.php:55
actionwpmu_new_blogcode\class-i-order-terms.php:57
actionadmin_initcode\class-i-order-terms.php:69
actionadmin_noticescode\class-i-order-terms.php:71
actionadmin_menucode\class-i-order-terms.php:73
actionadmin_enqueue_scriptscode\class-i-order-terms.php:75
Maintenance & Trust

I Order Terms Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 14, 2025
PHP min version5.6
Downloads21K

Community Trust

Rating100/100
Number of ratings11
Active installs1K
Developer Profile

I Order Terms Developer Profile

Igor Jerosimić

1 plugin · 1K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
27 days
View full developer profile
Detection Fingerprints

How We Detect I Order Terms

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/i-order-terms/code/assets/css/i-order-terms.css/wp-content/plugins/i-order-terms/code/assets/js/i-order-terms.js
Version Parameters
i-order-terms/style.css?ver=i-order-terms.js?ver=

HTML / DOM Fingerprints

CSS Classes
i-order-terms-tableterm-order-inputi-order-terms-save-button
Data Attributes
data-taxonomydata-term-id
JS Globals
i_order_terms
FAQ

Frequently Asked Questions about I Order Terms