listicle Security & Risk Analysis

wordpress.org/plugins/listicle

Listicle plugin, lets you create paginated lists where every item in a bulleted list generates a post

10 active installs v0.3 PHP + WP 3.0.1+ Updated Unknown
listiclelistspostseoshortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is listicle Safe to Use in 2026?

Generally Safe

Score 100/100

listicle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "listicle" v0.3 plugin exhibits a mixed security posture. While it demonstrates good practices in handling SQL queries with prepared statements and avoids file operations and external HTTP requests, significant concerns arise from its attack surface and code signals. The presence of an unprotected AJAX handler is a major vulnerability, allowing unauthenticated users to potentially exploit the plugin. Furthermore, the use of the `unserialize` function without proper sanitization or validation presents a critical risk of arbitrary object injection, as indicated by the taint analysis.

The plugin's vulnerability history is currently clean, with no known CVEs. This, combined with the absence of recorded common vulnerability types, suggests it has not been a target or that past versions have been robust. However, this historical cleanliness should not overshadow the critical risks identified in the current code analysis. The lack of nonce and capability checks on the AJAX handler and the dangerous `unserialize` function are substantial security weaknesses that require immediate attention, regardless of past vulnerability records.

In conclusion, while the "listicle" plugin has some strengths, particularly in its avoidance of external dependencies and secure SQL practices, the presence of an unprotected AJAX endpoint and the use of the insecure `unserialize` function create a significant risk profile. These issues need to be addressed to improve the plugin's overall security. The potential for arbitrary object injection via `unserialize` is particularly alarming and should be prioritized.

Key Concerns

  • Unprotected AJAX handler
  • Use of unserialize without proper checks
  • High severity taint flow
  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • Limited capability checks
Vulnerabilities
None known

listicle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

listicle Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
7 prepared
Unescaped Output
18
7 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$listicle_options = unserialize(get_option('listicle_options'));listease.php:203

SQL Query Safety

100% prepared7 total queries

Output Escaping

28% escaped25 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<listease> (listease.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

listicle Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_listicle_tease_statuslistease.php:7

Shortcodes 1

[listicle] listicle.php:628
WordPress Hooks 10
actionadmin_menulistease.php:51
actioninitlisticle.php:16
actionadmin_initlisticle.php:78
actionsave_postlisticle.php:79
filterpost_updated_messageslisticle.php:267
actioninitlisticle.php:291
filterthe_contentlisticle.php:794
filternext_post_linklisticle.php:834
filterprevious_post_linklisticle.php:835
actionwp_enqueue_scriptslisticle.php:847
Maintenance & Trust

listicle Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings6
Active installs10
Developer Profile

listicle Developer Profile

alxgrlk

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect listicle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[listicle][/listicle]
FAQ

Frequently Asked Questions about listicle