Old Post Alert Security & Risk Analysis

wordpress.org/plugins/old-post-alert

Remind your visitors about the age of old posts in the comment area - might cut down in irrelevant comments.

10 active installs v1.2.0 PHP + WP 1.5+ Updated Jun 24, 2022
agecommentspostrelevance
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Old Post Alert Safe to Use in 2026?

Generally Safe

Score 85/100

Old Post Alert has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

Based on the static analysis, "old-post-alert" v1.2.0 exhibits a strong security posture in several key areas. The plugin has no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly minimizes its attack surface. Furthermore, the code signals indicate no dangerous functions, no raw SQL queries (all are prepared), no file operations, no external HTTP requests, and a complete absence of insecure bundled libraries. This suggests a development process that prioritizes secure coding practices and relies on WordPress's built-in security mechanisms.

However, a significant concern arises from the output escaping analysis. With one total output and 0% properly escaped, this indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or external sources without proper sanitization and escaping is susceptible to malicious injection. While the taint analysis found no flows with unsanitized paths, this may be an artifact of the analysis scope or the limited attack surface. The absence of vulnerability history is positive, but it does not negate the identified risk in output escaping.

In conclusion, while "old-post-alert" v1.2.0 has commendable strengths in its minimal attack surface and secure handling of SQL and external interactions, the complete lack of output escaping presents a critical security weakness. This deficiency makes the plugin vulnerable to XSS attacks, which could lead to session hijacking, credential theft, or defacement of the website. Addressing this output escaping issue should be the immediate priority for improving the plugin's security.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Old Post Alert Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Old Post Alert Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Old Post Alert Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioncomment_formold-post-alert.php:60
Maintenance & Trust

Old Post Alert Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJun 24, 2022
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Old Post Alert Developer Profile

Crowd Favorite

7 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Old Post Alert

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
old_post_alert
FAQ

Frequently Asked Questions about Old Post Alert