Master IDs Security & Risk Analysis

wordpress.org/plugins/master-ids

Find any post type ID (Post, Page or CPT) in a dropdown list.

10 active installs v1.0.0 PHP + WP 3.0+ Updated Nov 5, 2016
countidpostsshow
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Master IDs Safe to Use in 2026?

Generally Safe

Score 85/100

Master IDs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'master-ids' plugin version 1.0.0 demonstrates a strong security posture in several key areas. The static analysis reveals no identified attack surface points, no dangerous functions, and a complete absence of file operations or external HTTP requests. Crucially, all SQL queries are handled with prepared statements, and there are no recorded vulnerabilities in its history. This indicates a developer who is aware of and likely implementing robust security practices for common WordPress plugin vulnerabilities.

However, there are significant areas of concern. The most prominent is the extremely low percentage of properly escaped output (11%). This suggests that user-supplied data, or data that could be influenced by external sources, might be outputted to the browser without proper sanitization, potentially leading to Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the complete lack of nonce and capability checks, even with zero entry points identified, is a notable weakness. While no direct vulnerabilities are currently exposed, these checks are fundamental security mechanisms for WordPress plugins and their absence leaves the plugin susceptible should any new entry points be introduced or discovered in the future. The developer has clearly prioritized avoiding common pitfalls like SQL injection and the use of dangerous functions, but the output escaping and authorization checks represent critical oversight areas.

In conclusion, while 'master-ids' v1.0.0 exhibits good practices in areas like SQL handling and the absence of known vulnerabilities, the severe deficiency in output escaping and the complete lack of authorization checks present a significant risk. The plugin is well-protected against certain attack vectors but remains vulnerable to XSS and potential privilege escalation if entry points were to be discovered. Improvements in output sanitization and the implementation of capability checks are strongly recommended to enhance its overall security.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Master IDs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Master IDs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

11% escaped9 total outputs
Attack Surface

Master IDs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitclass-master-ids.php:65
actionadmin_menuclass-master-ids.php:68
actionadmin_initclass-master-ids.php:69
Maintenance & Trust

Master IDs Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedNov 5, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Master IDs Developer Profile

Luis Rock

11 plugins · 1K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Master IDs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Master IDs