Jetpack Post Views Security & Risk Analysis

wordpress.org/plugins/jetpack-post-views

Display your most popular posts using Jetpack stats.

200 active installs v1.1.0 PHP + WP 3.5+ Updated Aug 6, 2014
jetpackpost-views
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jetpack Post Views Safe to Use in 2026?

Generally Safe

Score 85/100

Jetpack Post Views has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The jetpack-post-views plugin v1.1.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by having no known vulnerabilities, no critical taint flows, and a relatively small attack surface with all identified entry points appearing to have some level of protection (though specific checks are not detailed for all). The absence of file operations and external HTTP requests is also a positive sign.

However, several concerns are raised by the static analysis. The presence of the `unserialize` function twice without context is a significant red flag, as it can lead to remote code execution if used with untrusted input. Furthermore, 100% of the SQL queries are not using prepared statements, which opens the door to SQL injection vulnerabilities. The low percentage of properly escaped output (19%) indicates a high risk of cross-site scripting (XSS) vulnerabilities, especially given the lack of capability checks on entry points.

The plugin's vulnerability history is clean, which is a strength. This suggests that either the plugin has been developed with security in mind, or it hasn't been subjected to extensive targeted attacks. Nonetheless, the inherent risks identified in the static analysis, particularly the use of `unserialize` and raw SQL queries alongside poor output escaping, present significant security weaknesses that outweigh the clean vulnerability history.

Key Concerns

  • Dangerous function unserialize used twice
  • Raw SQL queries (100% not prepared)
  • Low output escaping percentage (19%)
  • No capability checks on entry points
Vulnerabilities
None known

Jetpack Post Views Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jetpack Post Views Release Timeline

v1.1.0Current
v1.0.9
v1.0.8
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

Jetpack Post Views Code Analysis

Dangerous Functions
2
Raw SQL Queries
2
0 prepared
Unescaped Output
46
11 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$stats = unserialize($stats_options);jetpack-post-views.php:92
unserialize$jetpack = unserialize($jetpack_options);jetpack-post-views.php:104

SQL Query Safety

0% prepared2 total queries

Output Escaping

19% escaped57 total outputs
Attack Surface

Jetpack Post Views Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[jpv] jetpack-post-views.php:1043
WordPress Hooks 11
actioninitjetpack-post-views.php:71
actionadmin_initjetpack-post-views.php:72
actionadmin_menujetpack-post-views.php:73
actionmanage_posts_custom_columnjetpack-post-views.php:74
filterplugin_action_linksjetpack-post-views.php:75
filtermanage_posts_columnsjetpack-post-views.php:76
filtermanage_edit-post_sortable_columnsjetpack-post-views.php:77
filterrequestjetpack-post-views.php:78
actionjetpack_post_views_scheduled_updatejetpack-post-views.php:81
actionpublish_postjetpack-post-views.php:84
actionwidgets_initjetpack-post-views.php:965

Scheduled Events 1

jetpack_post_views_scheduled_update
Maintenance & Trust

Jetpack Post Views Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedAug 6, 2014
PHP min version
Downloads30K

Community Trust

Rating100/100
Number of ratings9
Active installs200
Developer Profile

Jetpack Post Views Developer Profile

Steven Lambert

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jetpack Post Views

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jetpack-post-views/languages/jetpack-post-views.pot

HTML / DOM Fingerprints

CSS Classes
jetpack-post-views
HTML Comments
Copyright 2013 Steven Lambert (email : steven@sklambert.com)This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License, version 2, aspublished by the Free Software Foundation.+7 more
Data Attributes
jetpack-post-views_versionjetpack_post_views_settingsjetpack-post-views-widget
FAQ

Frequently Asked Questions about Jetpack Post Views