
Page and Post Description Security & Risk Analysis
wordpress.org/plugins/page-and-post-descriptionView Description for each Page and Post.
Is Page and Post Description Safe to Use in 2026?
Generally Safe
Score 100/100Page and Post Description has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "page-and-post-description" plugin version 1.7 exhibits a mixed security posture. On the positive side, it demonstrates good practices in SQL query handling and output escaping, with 100% of SQL queries using prepared statements and all outputs being properly escaped. The absence of file operations, external HTTP requests, and bundled libraries are also strengths. Furthermore, the plugin has no recorded vulnerabilities in its history, suggesting a history of stable and secure development.
However, the analysis reveals significant concerns. The plugin exposes a single AJAX handler without any authentication or capability checks. This unprotected entry point is a primary risk. Compounding this, a taint analysis identified one flow with an unsanitized path classified as high severity. This, coupled with the presence of the `unserialize` function, which can be a gateway to remote code execution if misused with untrusted input, presents a notable risk. The lack of authentication on the AJAX endpoint means that an attacker could potentially trigger this high-severity taint flow with unsanitized input, leading to a security compromise.
In conclusion, while the plugin has a clean vulnerability history and implements some strong security measures, the critical finding of an unprotected AJAX handler and a high-severity unsanitized taint flow, potentially exacerbated by the use of `unserialize`, creates a significant security risk. The absence of authentication on this critical entry point is the most pressing concern that needs immediate attention. Addressing this unprotected AJAX handler and ensuring all inputs processed by the plugin are thoroughly sanitized is paramount to improving its security.
Key Concerns
- AJAX handler without auth checks
- High severity unsanitized taint flow
- Dangerous function: unserialize
Page and Post Description Security Vulnerabilities
Page and Post Description Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Page and Post Description Attack Surface
AJAX Handlers 1
WordPress Hooks 6
Maintenance & Trust
Page and Post Description Maintenance & Trust
Maintenance Signals
Community Trust
Page and Post Description Alternatives
Custom Post Type Editor
cpt-editor
Customize the text labels, menu names or description for any registered custom post type using a simple Dashboard user interface.
Page & Post Notes
page-post-notes
Simple plugin that allow you to notes on pages and posts
Notely
notely
Create admin text notes for any post, page or custom post type.
Beckin Post Notes
beckin-post-notes
Add private admin notes to posts, pages, and custom post types - simple, fast, and clutter-free.
Simple Content Upload By CSV
simple-content-upload-by-csv
Upload your content data either it is custom post type, post or page.
Page and Post Description Developer Profile
15 plugins · 2K total installs
How We Detect Page and Post Description
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/page-and-post-description/admin-style.css/wp-content/plugins/page-and-post-description/includes/post-list.js/wp-content/plugins/page-and-post-description/includes/post-list.jsHTML / DOM Fingerprints
name='pnpd_description'PageAndPostDescription_VarObject