Extend Post Data Security & Risk Analysis

wordpress.org/plugins/mhm-extend-postdata

Extend Post and Page data with all related meta data.

10 active installs v1.0.9 PHP + WP 4.2+ Updated Jan 6, 2020
extendmetametadatapostdata
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Extend Post Data Safe to Use in 2026?

Generally Safe

Score 85/100

Extend Post Data has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The static analysis of mhm-extend-postdata v1.0.9 reveals an exceptionally clean code base with no detected dangerous functions, raw SQL queries, file operations, external HTTP requests, or taint flows. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. However, the analysis does flag one total output, of which 0% are properly escaped, indicating a potential risk of cross-site scripting (XSS) vulnerabilities if this output is rendered to the user. Furthermore, the complete lack of nonce and capability checks across all potential entry points (though there are none explicitly identified) means that if any new entry points were introduced or if the plugin were to interact with core WordPress functionalities in the future, it would be highly susceptible to various attacks, including CSRF and privilege escalation.

The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests a strong track record of security, either due to a limited impact or robust development practices. However, the absence of any vulnerability history does not negate the risks identified in the static analysis. The primary concern stemming from the code analysis is the unescaped output, which, combined with the lack of any authorization checks, presents a clear and present danger that could be exploited. While the plugin has no identified vulnerabilities historically, the potential for XSS due to unescaped output needs to be addressed.

Key Concerns

  • Unescaped output detected
  • No capability checks on potential entry points
  • No nonce checks on potential entry points
Vulnerabilities
None known

Extend Post Data Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Extend Post Data Release Timeline

v1.0.9Current
v1.0.8
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3.1
v1.0.3
v1.0.2
Code Analysis
Analyzed Mar 17, 2026

Extend Post Data Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Extend Post Data Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionthe_postindex.php:24
Maintenance & Trust

Extend Post Data Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 6, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Extend Post Data Developer Profile

Mark Howells-Mead

10 plugins · 2K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extend Post Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mhm-extend-postdata/assets/css/style.css
Script Paths
/wp-content/plugins/mhm-extend-postdata/assets/js/script.js
Version Parameters
mhm-extend-postdata/assets/css/style.css?ver=mhm-extend-postdata/assets/js/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Extend Post Data