Pagenator Security & Risk Analysis

wordpress.org/plugins/pagenator

Pagenator is plugin that add buttons of prev and next to posts.

10 active installs v1.0.0 PHP + WP 3.5+ Updated Nov 22, 2014
pagenatorpaginator
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pagenator Safe to Use in 2026?

Generally Safe

Score 85/100

Pagenator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "pagenator" v1.0.0 plugin exhibits a concerning security posture, primarily due to a lack of fundamental security practices. While the static analysis reports a zero attack surface, this is misleading given the significant code signals indicating potential vulnerabilities. The complete absence of output escaping and the use of raw SQL queries without prepared statements are critical red flags. These issues, if exploitable, could lead to cross-site scripting (XSS) and SQL injection vulnerabilities respectively. The lack of any capability or nonce checks further exacerbates these risks, suggesting that any discovered vulnerabilities would likely be unauthenticated.

The vulnerability history is currently clean, with no recorded CVEs. This could indicate a newly released plugin, a plugin that hasn't been extensively analyzed for vulnerabilities, or simply that no exploitable vulnerabilities have been discovered yet. However, the current code signals are strong indicators of inherent weaknesses that are ripe for exploitation. Therefore, despite the lack of a documented vulnerability history, the current code quality presents a substantial risk. The plugin demonstrates a significant departure from secure WordPress development best practices, making it a target for attackers seeking to exploit common web application vulnerabilities.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Pagenator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pagenator Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

Pagenator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedpagenator.php:34
actionwp_enqueue_scriptspublic\pagenator-public.php:26
actionwp_enqueue_scriptspublic\pagenator-public.php:27
filterthe_contentpublic\pagenator-public.php:29
filternext_post_linkpublic\pagenator-public.php:67
filterprevious_post_linkpublic\pagenator-public.php:68
Maintenance & Trust

Pagenator Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedNov 22, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Pagenator Developer Profile

NullLogic

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pagenator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pagenator/assets/css/pagenator.css/wp-content/plugins/pagenator/assets/js/public.js
Script Paths
/wp-content/plugins/pagenator/assets/js/public.js
Version Parameters
pagenator/assets/css/pagenator.css?ver=1.0.0pagenator/assets/js/public.js?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
next_buttonprev_button
FAQ

Frequently Asked Questions about Pagenator