Page In Page Security & Risk Analysis

wordpress.org/plugins/page-in-page

This plugin helps you insert a post or page from the WP posts database table within another, bring your Facebook posts and Twitter feeds to your blog.

200 active installs v2.0.3 PHP + WP 3.0.1+ Updated Feb 24, 2014
insert-post-in-pagepagepostshortcodewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Page In Page Safe to Use in 2026?

Generally Safe

Score 85/100

Page In Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "page-in-page" v2.0.3 plugin exhibits a mixed security posture. On the positive side, there are no known vulnerabilities in its history, and the static analysis reveals no dangerous functions, no raw SQL queries, and no taint flows indicating critical or high-severity issues. The plugin also has a limited attack surface with no unprotected entry points identified.

However, significant concerns arise from the code signals. The extremely low percentage of properly escaped output (6%) is a major red flag. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, where user-supplied data could be rendered unsafely, allowing attackers to inject malicious scripts. The presence of file operations and external HTTP requests, while not inherently insecure, requires careful scrutiny to ensure they are handled with proper sanitization and validation to prevent path traversal or unintended data leakage.

In conclusion, while the absence of known vulnerabilities and critical code flaws is encouraging, the poor output escaping practices present a substantial security risk. This weakness needs to be addressed to improve the plugin's overall security.

Key Concerns

  • Poor output escaping practices
  • File operations present
  • External HTTP requests present
Vulnerabilities
None known

Page In Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Page In Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
62
4 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
5
Bundled Libraries
0

Output Escaping

6% escaped66 total outputs
Attack Surface

Page In Page Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[twl_page_in] classes\page.php:22
[twl_page_in_wp] classes\page.php:23
[twl_page_in_fb] classes\page.php:24
[twl_page_in_tw] classes\page.php:25
WordPress Hooks 5
actionadmin_menuclasses\admin.php:8
actionwidgets_initclasses\widgets.php:183
actioninitfunctions.php:36
actionwp_enqueue_scriptsfunctions.php:54
actionadmin_initfunctions.php:55
Maintenance & Trust

Page In Page Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 24, 2014
PHP min version
Downloads8K

Community Trust

Rating72/100
Number of ratings5
Active installs200
Developer Profile

Page In Page Developer Profile

Cyril

2 plugins · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Page In Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/page-in-page/assets/css/page-in-page.css/wp-content/plugins/page-in-page/assets/js/page-in-page.js
Script Paths
/wp-content/plugins/page-in-page/assets/js/page-in-page.js
Version Parameters
page-in-page/assets/css/page-in-page.css?ver=page-in-page/assets/js/page-in-page.js?ver=

HTML / DOM Fingerprints

CSS Classes
twl-page-in-pagetwl-page-in-page-titletwl-page-in-page-imagetwl-page-in-page-contenttwl-page-in-page-text
Data Attributes
data-twl-page-in-page-id
JS Globals
TWL_Page_IN_Page_PageTWL_Page_IN_Page_WidgetTWL_Page_In_Page_VarsTWL_PIP_Config
Shortcode Output
[twl_page_in[twl_page_in_wp[twl_page_in_fb[twl_page_in_tw
FAQ

Frequently Asked Questions about Page In Page