Pageview content restriction Security & Risk Analysis

wordpress.org/plugins/pageview-content-restriction

Restricts access to your Wordpress site after a certain number of pageviews.

10 active installs v1.0 PHP + WP 3.8+ Updated Aug 8, 2015
accesscontent-restrictionmember-onlyrestrictrestricted-access
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pageview content restriction Safe to Use in 2026?

Generally Safe

Score 85/100

Pageview content restriction has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "pageview-content-restriction" plugin v1.0 presents a generally positive security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events, especially those without authentication or permission checks, significantly limits the attack surface. Furthermore, the complete reliance on prepared statements for SQL queries and the high percentage of properly escaped output are strong indicators of good coding practices concerning data handling and prevention of common web vulnerabilities like SQL injection and XSS.

However, there are some notable concerns that temper this otherwise positive assessment. The plugin exhibits zero nonce checks and zero capability checks, which are critical security mechanisms in WordPress for preventing unauthorized actions and ensuring proper authorization. While the current entry points are zero, the lack of these checks means that if any new entry points are introduced in the future, they would be inherently unprotected. The plugin also performs six file operations, and while no specific vulnerabilities are flagged, the nature and security of these operations would require closer inspection to ensure they do not introduce risks such as arbitrary file read/write vulnerabilities.

The vulnerability history is also a strength, with no recorded CVEs, indicating a lack of known historical security flaws. This, combined with the positive static analysis findings, suggests a developer who is likely security-conscious. Despite the strengths, the absence of essential security checks like nonces and capability checks represents a significant weakness that could lead to vulnerabilities if the plugin's attack surface expands or if new attack vectors are discovered.

Key Concerns

  • No Nonce Checks Implemented
  • No Capability Checks Implemented
  • File operations without explicit security review context
Vulnerabilities
None known

Pageview content restriction Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Pageview content restriction Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Pageview content restriction Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
0
Bundled Libraries
0

Output Escaping

89% escaped9 total outputs
Attack Surface

Pageview content restriction Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionget_headerpageview_content_restriction.php:82
actioninitpageview_content_restriction.php:90
actioninitpageview_content_restriction.php:96
actionwp_loginpageview_content_restriction.php:211
actionadmin_menupageview_content_restriction.php:224
actionadmin_initpageview_content_restriction.php:225
Maintenance & Trust

Pageview content restriction Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedAug 8, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Pageview content restriction Developer Profile

curlybracket

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pageview content restriction

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Pageviews : $current_pageviews -->
FAQ

Frequently Asked Questions about Pageview content restriction