Parent Category Toggler Security & Risk Analysis

wordpress.org/plugins/parent-category-toggler

Automatically toggle the parent categories when a sub category is selected.

10K active installs v1.3.4 PHP + WP 2.5+ Updated Nov 28, 2017
categoryparenttoggle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Parent Category Toggler Safe to Use in 2026?

Generally Safe

Score 85/100

Parent Category Toggler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'parent-category-toggler' plugin v1.3.4 exhibits a generally positive security posture based on the static analysis provided. It has no reported vulnerabilities in its history, indicating a history of secure development or diligent patching. The static analysis reveals a remarkably small attack surface with no observable entry points that lack authentication or permission checks. Furthermore, the code does not utilize dangerous functions, performs no file operations or external HTTP requests, and all SQL queries are properly prepared, which are excellent security practices.

However, a significant concern arises from the output escaping analysis. With one total output and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user without proper sanitization could potentially be manipulated by attackers to inject malicious scripts. The absence of any identified taint flows or critical/high severity issues in the taint analysis is encouraging, but the lack of output escaping effectively bypasses these findings by creating a direct avenue for exploitation.

In conclusion, while the plugin has a clean vulnerability history and a well-secured entry point strategy, the critical flaw in output escaping presents a substantial security risk that overshadows its strengths. Developers should prioritize addressing this unescaped output to prevent potential XSS attacks.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

Parent Category Toggler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Parent Category Toggler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Parent Category Toggler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_footer-post.phpparent-category-toggler.php:52
actionadmin_footer-post-new.phpparent-category-toggler.php:53
Maintenance & Trust

Parent Category Toggler Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 28, 2017
PHP min version
Downloads83K

Community Trust

Rating96/100
Number of ratings15
Active installs10K
Developer Profile

Parent Category Toggler Developer Profile

Ben Lobaugh (blobaugh)

11 plugins · 11K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Parent Category Toggler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
checkParentNodesfindParentObj
FAQ

Frequently Asked Questions about Parent Category Toggler