p5 : Plenty of Perishable Passwords for Protected Posts Security & Risk Analysis

wordpress.org/plugins/p5

Specify multiple passwords for pages / posts / custom post types. An expiration date can be set for each password.

50 active installs v1.4 PHP + WP 3.5+ Updated May 20, 2014
expirationpasswordprotected-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is p5 : Plenty of Perishable Passwords for Protected Posts Safe to Use in 2026?

Generally Safe

Score 85/100

p5 : Plenty of Perishable Passwords for Protected Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The p5 plugin v1.4 presents a mixed security posture. While it shows some good practices, such as a relatively low number of total entry points and a good percentage of SQL queries using prepared statements, there are significant concerns regarding authentication. The plugin has two AJAX handlers, and critically, both of them lack any authentication checks. This creates a substantial attack surface where unauthorized users could potentially trigger plugin functionality. Furthermore, the taint analysis revealed one flow with an unsanitized path, which, although not classified as critical or high severity in this analysis, represents a potential vector for attackers if the flow involves user-supplied input that is not properly validated or escaped. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator. However, this absence of history, coupled with the identified authentication flaws and unsanitized path, means that the plugin has not been rigorously tested against common exploit vectors, and the lack of auth checks makes it a prime target.

In conclusion, the p5 plugin v1.4 has strengths in its SQL handling and lack of known vulnerabilities. However, the complete absence of authentication checks on its AJAX endpoints is a severe weakness that significantly elevates its risk profile. The identified unsanitized path, while currently low severity, also warrants attention. Developers should prioritize implementing robust authentication and authorization for all entry points, especially AJAX handlers, and ensuring thorough input sanitization and output escaping to mitigate these risks.

Key Concerns

  • AJAX handlers without auth checks
  • Flow with unsanitized path
  • No nonce checks on AJAX
  • Low output escaping percentage
Vulnerabilities
None known

p5 : Plenty of Perishable Passwords for Protected Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

p5 : Plenty of Perishable Passwords for Protected Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
8 prepared
Unescaped Output
17
2 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

73% prepared11 total queries

Output Escaping

11% escaped19 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
action_ajax_date (index.php:463)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

p5 : Plenty of Perishable Passwords for Protected Posts Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_p5_dateindex.php:69
authwp_ajax_p5_get_new_password_uiindex.php:71
WordPress Hooks 7
actionplugins_loadedindex.php:66
filterthe_password_formindex.php:74
actionlogin_form_postpassindex.php:77
actionpost_submitbox_misc_actionsindex.php:83
actionsave_postindex.php:89
actionadmin_enqueue_scriptsindex.php:95
actionp5cronindex.php:98

Scheduled Events 1

p5cron
Maintenance & Trust

p5 : Plenty of Perishable Passwords for Protected Posts Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 20, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings5
Active installs50
Developer Profile

p5 : Plenty of Perishable Passwords for Protected Posts Developer Profile

Cyril Batillat

4 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect p5 : Plenty of Perishable Passwords for Protected Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/p5/js/p5_admin.js/wp-content/plugins/p5/css/p5_admin.css
Script Paths
/wp-content/plugins/p5/js/p5_admin.js

HTML / DOM Fingerprints

CSS Classes
p5-sectionp5_postpasswordsp5_postpasswordp5-section-footer
Data Attributes
id="p5-section"id="p5_postpasswords"id="p5_add_password"class="p5_postpassword"name="p5[delete]"name="p5[password]"+1 more
JS Globals
p5_ajaxurl
FAQ

Frequently Asked Questions about p5 : Plenty of Perishable Passwords for Protected Posts