List All Pages Security & Risk Analysis

wordpress.org/plugins/list-all-pages

List all pages on a WordPress site for easy browsing and editing.

60 active installs v1.1 PHP + WP 3.0.0+ Updated Apr 26, 2013
developmentlist-pagesquick-edits
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is List All Pages Safe to Use in 2026?

Generally Safe

Score 85/100

List All Pages has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "list-all-pages" v1.1 plugin exhibits a strong security posture in several key areas, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface and no unprotected entry points. The code analysis also indicates a commendable absence of dangerous functions, file operations, external HTTP requests, and reliance on bundled libraries. Furthermore, all SQL queries are properly prepared, and there are no recorded vulnerabilities in its history, suggesting a developer who is mindful of secure coding practices.

However, a significant concern arises from the output escaping. The static analysis reveals that 100% of the identified outputs are not properly escaped. This represents a critical weakness, as unsanitized output can lead to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website, potentially compromising user sessions or defacing the site. While the absence of a large attack surface and a clean vulnerability history are positive, the lack of output escaping is a serious oversight that could be exploited if any of the plugin's outputs are ever rendered in a user-facing context.

In conclusion, the "list-all-pages" v1.1 plugin has a foundation of good security practices by minimizing its attack surface and avoiding common pitfalls like raw SQL queries. The lack of historical vulnerabilities is also a positive indicator. Nevertheless, the complete failure to implement proper output escaping is a critical security flaw that must be addressed immediately to mitigate the risk of XSS attacks. The plugin is otherwise well-maintained and secure, but this single deficiency significantly impacts its overall security rating.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

List All Pages Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

List All Pages Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

List All Pages Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_headshowAllPages.php:59
actionadmin_menushowAllPages.php:60
actionadmin_enqueue_scriptsshowAllPages.php:61
Maintenance & Trust

List All Pages Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 26, 2013
PHP min version
Downloads5K

Community Trust

Rating80/100
Number of ratings5
Active installs60
Developer Profile

List All Pages Developer Profile

The Jake Group

4 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect List All Pages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/list-all-pages/allpages.css/wp-content/plugins/list-all-pages/icon.png/wp-content/plugins/list-all-pages/allpages.js
Script Paths
/wp-content/plugins/list-all-pages/allpages.js
Version Parameters
list-all-pages/allpages.css?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
tjg-show-allpagelistdepth-
Data Attributes
id="tjg-show-all"class="wp-submenu"class="pagelist"class="depth-
FAQ

Frequently Asked Questions about List All Pages