Obvious Post States Security & Risk Analysis

wordpress.org/plugins/obvious-post-states

Make the WordPress post state text (draft, pending, sticky, etc) stand out.

20 active installs v1.0.3 PHP + WP 4.0+ Updated Aug 23, 2015
draftspassword-protectedpendingpost-statesticky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Obvious Post States Safe to Use in 2026?

Generally Safe

Score 85/100

Obvious Post States has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "obvious-post-states" plugin version 1.0.3 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified vulnerabilities, CVEs, or taint flows is highly positive. Furthermore, the complete lack of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are excellent security practices. The plugin also demonstrates good protection for its identified entry points, with no unprotected AJAX handlers, REST API routes, shortcodes, or cron events. This indicates a diligent approach to securing the plugin's interaction points.

However, a significant concern arises from the output escaping analysis, where 100% of outputs are not properly escaped. This presents a potential Cross-Site Scripting (XSS) vulnerability, as unsanitized output displayed to users could be manipulated to inject malicious scripts. While the attack surface is zero, and the plugin has no recorded vulnerability history, this single unescaped output represents a clear and present risk. The lack of capability checks and nonce checks, while not directly evidenced as exploitable given the zero attack surface, could become a weakness if the attack surface were to expand in future versions without corresponding security checks. In conclusion, the plugin is largely secure with excellent foundational practices, but the unescaped output is a critical flaw that requires immediate attention.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Obvious Post States Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Obvious Post States Release Timeline

v1.0.3Current
v1.0.2
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Obvious Post States Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Obvious Post States Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_enqueue_scriptsobvious-post-states.php:16
actionlogin_enqueue_scriptsobvious-post-states.php:17
filterdisplay_post_statesobvious-post-states.php:20
Maintenance & Trust

Obvious Post States Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 23, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs20
Developer Profile

Obvious Post States Developer Profile

ryansommers

2 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Obvious Post States

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/obvious-post-states/obvious-post-states.css/wp-content/plugins/obvious-post-states/js/obvious-post-states.js
Script Paths
/wp-content/plugins/obvious-post-states/js/obvious-post-states.js
Version Parameters
obvious-post-states.css?ver=obvious-post-states.js?ver=

HTML / DOM Fingerprints

CSS Classes
post-state
FAQ

Frequently Asked Questions about Obvious Post States