L7 Display Posts Security & Risk Analysis

wordpress.org/plugins/l7-display-posts

Efficiently show posts by tag or category using a simple shortcode. Utilizes caching for greater speed and fewer database calls.

20 active installs v0.1.1 PHP + WP 4.1.1+ Updated Mar 30, 2016
columnsdisplaypostsshowtag
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is L7 Display Posts Safe to Use in 2026?

Generally Safe

Score 85/100

L7 Display Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'l7-display-posts' plugin version 0.1.1 exhibits a generally strong security posture based on the static analysis. The absence of dangerous functions, SQL queries performed exclusively via prepared statements, and a high percentage of properly escaped output are positive indicators. Furthermore, the plugin has no known vulnerabilities (CVEs) and no reported vulnerabilities in its history, suggesting a history of secure development. The limited attack surface, with only one shortcode and no AJAX handlers, REST API routes, or cron events, further enhances its security. The lack of external HTTP requests and file operations also reduces potential attack vectors.

However, there are a few areas that warrant attention. The plugin does not implement any nonce checks or capability checks. While the current attack surface is minimal and the shortcode may not inherently require these, it represents a missed opportunity for robust security, especially if the plugin's functionality were to expand or its shortcode's output became more complex or user-controlled in future versions. The absence of taint analysis results is noted, though this could be due to the limited complexity or lack of user-supplied input processing within the analyzed code, rather than an explicit security flaw.

In conclusion, 'l7-display-posts' v0.1.1 appears to be a secure plugin due to its clean code practices, lack of known vulnerabilities, and small attack surface. The primary area for improvement lies in implementing proper authorization checks, such as nonce and capability checks, to further harden the plugin against potential future threats or expansions of its functionality.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

L7 Display Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

L7 Display Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

85% escaped20 total outputs
Attack Surface

L7 Display Posts Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[Display Posts] includes\functions\core.php:67
WordPress Hooks 5
actioninitincludes\functions\core.php:21
actioninitincludes\functions\core.php:22
filterexcerpt_moreincludes\functions\core.php:73
filtercontent_save_preincludes\functions\core.php:79
actionsave_post_postincludes\functions\core.php:86
Maintenance & Trust

L7 Display Posts Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 30, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

L7 Display Posts Developer Profile

Jeff

4 plugins · 140 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect L7 Display Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/l7-display-posts/assets/css/primary-tag-plugin.min.css

HTML / DOM Fingerprints

Shortcode Output
[Display Poststag=cat=posts=
FAQ

Frequently Asked Questions about L7 Display Posts