
Mark Posts Security & Risk Analysis
wordpress.org/plugins/mark-postsMark and highlight posts, pages and posts of custom post types within the posts overview.
Is Mark Posts Safe to Use in 2026?
Generally Safe
Score 91/100Mark Posts has a strong security track record. Known vulnerabilities have been patched promptly.
The "mark-posts" plugin version 2.2.6 exhibits a generally good security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code shows strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and implementing a healthy number of nonce and capability checks, indicating a conscious effort to prevent common web vulnerabilities. The lack of dangerous function usage, file operations, and external HTTP requests further bolsters its security profile.
However, a notable concern arises from the vulnerability history. The plugin has a past of two known medium severity vulnerabilities, specifically "Missing Authorization" and "Cross-site Scripting" (Improper Neutralization of Input During Web Page Generation). Although currently unpatched CVEs are zero, this history suggests that the plugin may have previously been susceptible to attacks that could lead to unauthorized actions or data leakage. The fact that the last vulnerability was recorded very recently (January 2025) is a point of attention. While the current code analysis does not reveal immediate critical threats, the historical pattern warrants careful consideration and ongoing monitoring.
In conclusion, "mark-posts" v2.2.6 demonstrates a strong technical foundation with secure coding practices for its current codebase. The primary weakness lies in its vulnerability history, which highlights past security oversights. While the current static analysis is clean, the historical pattern suggests that users should remain vigilant and ensure they are always using the latest versions of the plugin, as past issues may indicate potential recurring security challenges or undiscovered vulnerabilities that could be introduced in future updates.
Key Concerns
- Past medium severity XSS vulnerability
- Past medium severity Missing Authorization vulnerability
- 63% of output properly escaped
Mark Posts Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Mark Posts <= 2.2.4 - Missing Authorization
Mark Posts <= 2.0.0 - Admin+ Stored Cross-Site Scripting
Mark Posts Code Analysis
SQL Query Safety
Output Escaping
Mark Posts Attack Surface
WordPress Hooks 21
Maintenance & Trust
Mark Posts Maintenance & Trust
Maintenance Signals
Community Trust
Mark Posts Alternatives
Colored Admin Post List
colored-admin-post-list
Highlights the background of draft, pending, future, private, published and custom post status posts in the wordpress admin.
HTML Editor Syntax Highlighter
html-editor-syntax-highlighter
Add syntax highlighting to WordPress code editors using CodeMirror.js
Search Everything
search-everything
Search Everything increases WordPress' default search functionality in three easy steps.
Color Mobile Browser Address Bar
color-mobile-browser-address-bar
A WordPress plugin that lets you add a custom color to the address bar of mobile browsers.
Custom Highlight Color
custom-highlight-color
Many devices and browsers provide less-than-ideal colors when selecting text on sites. Users may select text for a variety of reasons, including as a …
Mark Posts Developer Profile
1 plugin · 1K total installs
How We Detect Mark Posts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/mark-posts/assets/css/admin.css/wp-content/plugins/mark-posts/assets/js/markposts.jsmark-posts/assets/css/admin.css?ver=mark-posts/assets/js/markposts.js?ver=HTML / DOM Fingerprints
mark_posts