Mark Posts Security & Risk Analysis

wordpress.org/plugins/mark-posts

Mark and highlight posts, pages and posts of custom post types within the posts overview.

1K active installs v2.2.6 PHP 7.0+ WP 4.1+ Updated Feb 12, 2025
colorfeaturedhighlightstatustag
91
A · Safe
CVEs total2
Unpatched0
Last CVEJan 16, 2025
Safety Verdict

Is Mark Posts Safe to Use in 2026?

Generally Safe

Score 91/100

Mark Posts has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Jan 16, 2025Updated 1yr ago
Risk Assessment

The "mark-posts" plugin version 2.2.6 exhibits a generally good security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code shows strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and implementing a healthy number of nonce and capability checks, indicating a conscious effort to prevent common web vulnerabilities. The lack of dangerous function usage, file operations, and external HTTP requests further bolsters its security profile.

However, a notable concern arises from the vulnerability history. The plugin has a past of two known medium severity vulnerabilities, specifically "Missing Authorization" and "Cross-site Scripting" (Improper Neutralization of Input During Web Page Generation). Although currently unpatched CVEs are zero, this history suggests that the plugin may have previously been susceptible to attacks that could lead to unauthorized actions or data leakage. The fact that the last vulnerability was recorded very recently (January 2025) is a point of attention. While the current code analysis does not reveal immediate critical threats, the historical pattern warrants careful consideration and ongoing monitoring.

In conclusion, "mark-posts" v2.2.6 demonstrates a strong technical foundation with secure coding practices for its current codebase. The primary weakness lies in its vulnerability history, which highlights past security oversights. While the current static analysis is clean, the historical pattern suggests that users should remain vigilant and ensure they are always using the latest versions of the plugin, as past issues may indicate potential recurring security challenges or undiscovered vulnerabilities that could be introduced in future updates.

Key Concerns

  • Past medium severity XSS vulnerability
  • Past medium severity Missing Authorization vulnerability
  • 63% of output properly escaped
Vulnerabilities
2

Mark Posts Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-23963medium · 4.3Missing Authorization

Mark Posts <= 2.2.4 - Missing Authorization

Jan 16, 2025 Patched in 2.2.5 (15d)
CVE-2022-0958medium · 4.8Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mark Posts <= 2.0.0 - Admin+ Stored Cross-Site Scripting

Mar 14, 2022 Patched in 2.0.1 (680d)
Code Analysis
Analyzed Mar 16, 2026

Mark Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
7
12 escaped
Nonce Checks
5
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

63% escaped19 total outputs
Attack Surface

Mark Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 21
actionadmin_enqueue_scriptsadmin\class-mark-posts-admin.php:51
actionadmin_enqueue_scriptsadmin\class-mark-posts-admin.php:52
actionadmin_menuadmin\class-mark-posts-admin.php:55
actionwp_dashboard_setupadmin\class-mark-posts-admin.php:65
actionbulk_edit_custom_boxadmin\class-mark-posts-admin.php:73
actionquick_edit_custom_boxadmin\class-mark-posts-admin.php:74
actionadmin_print_scripts-edit.phpadmin\class-mark-posts-admin.php:76
actionadd_meta_boxesadmin\class-mark-posts-admin.php:79
actionsave_postadmin\class-mark-posts-admin.php:81
actionsave_postadmin\class-mark-posts-admin.php:83
actionsave_postadmin\class-mark-posts-admin.php:85
actiontrash_postadmin\class-mark-posts-admin.php:87
actiondelete_postadmin\class-mark-posts-admin.php:89
actionadmin_enqueue_scriptsadmin\class-mark-posts-admin.php:195
actionadmin_headadmin\class-mark-posts-admin.php:196
actionplugins_loadedmark-posts.php:64
actionplugins_loadedmark-posts.php:70
actionplugins_loadedmark-posts.php:79
actioninitpublic\class-mark-posts.php:52
actionwpmu_new_blogpublic\class-mark-posts.php:55
actionadmin_initpublic\class-mark-posts.php:58
Maintenance & Trust

Mark Posts Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 12, 2025
PHP min version7.0
Downloads17K

Community Trust

Rating96/100
Number of ratings10
Active installs1K
Developer Profile

Mark Posts Developer Profile

flymke

1 plugin · 1K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
348 days
View full developer profile
Detection Fingerprints

How We Detect Mark Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mark-posts/assets/css/admin.css
Script Paths
/wp-content/plugins/mark-posts/assets/js/markposts.js
Version Parameters
mark-posts/assets/css/admin.css?ver=mark-posts/assets/js/markposts.js?ver=

HTML / DOM Fingerprints

JS Globals
mark_posts
FAQ

Frequently Asked Questions about Mark Posts