Peter’s Post Notes Security & Risk Analysis

wordpress.org/plugins/peters-post-notes

Add notes to the "edit post" and "edit page" sidebars. Collaborators can also share notes on the WordPress dashboard.

3K active installs v1.6.5 PHP + WP 3.2+ Updated Aug 20, 2020
admincollaborationnotificationpostworkflow
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Peter’s Post Notes Safe to Use in 2026?

Generally Safe

Score 85/100

Peter’s Post Notes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "peters-post-notes" plugin v1.6.5 exhibits a mixed security posture. While it demonstrates good practices in avoiding dangerous functions, file operations, and external HTTP requests, and has a clean vulnerability history, significant concerns arise from its attack surface and code analysis. Two of its three AJAX handlers lack authentication checks, presenting a direct entry point for unauthorized actions. The taint analysis reveals three high-severity flows with unsanitized paths, indicating potential for injection vulnerabilities if these paths are reachable through the unprotected AJAX handlers. Furthermore, only 21% of output is properly escaped, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities, especially when combined with unsanitized input from the unprotected AJAX endpoints. The limited use of prepared statements for SQL queries (33%) also poses a risk of SQL injection, particularly if sensitive data is handled without proper sanitization.

While the plugin has no known CVEs, this is not a guarantee of current security. The presence of critical taint flows and unprotected entry points suggests potential vulnerabilities that may not have been discovered or publicly disclosed. The lack of robust authentication on AJAX handlers is a critical oversight. The plugin's strengths lie in its absence of known vulnerabilities and its avoidance of certain high-risk practices. However, the identified weaknesses, particularly the unprotected AJAX endpoints and unsanitized data flows, create a significant risk profile that requires immediate attention to prevent exploitation.

Key Concerns

  • Unprotected AJAX handlers
  • High severity taint flows with unsanitized paths
  • Low percentage of properly escaped output
  • Low percentage of SQL queries using prepared statements
Vulnerabilities
None known

Peter’s Post Notes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Peter’s Post Notes Code Analysis

Dangerous Functions
0
Raw SQL Queries
14
7 prepared
Unescaped Output
46
12 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

33% prepared21 total queries

Output Escaping

21% escaped58 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
ppn_delete_note (peters_post_notes.php:1219)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Peter’s Post Notes Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 3

authwp_ajax_ppn_edit_notepeters_post_notes.php:1133
authwp_ajax_ppn_delete_notepeters_post_notes.php:1217
authwp_ajax_ppn_load_pagepeters_post_notes.php:1266
WordPress Hooks 10
actioninitpeters_post_notes.php:48
actionadmin_menupeters_post_notes.php:1095
actionadmin_menupeters_post_notes.php:1287
actionwp_dashboard_setuppeters_post_notes.php:1288
actionwp_dashboard_setuppeters_post_notes.php:1289
actionedit_postpeters_post_notes.php:1290
actiondelete_postpeters_post_notes.php:1291
actionadmin_print_scriptspeters_post_notes.php:1295
filtermanage_posts_columnspeters_post_notes.php:1298
actionmanage_posts_custom_columnpeters_post_notes.php:1299
Maintenance & Trust

Peter’s Post Notes Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 20, 2020
PHP min version
Downloads78K

Community Trust

Rating98/100
Number of ratings26
Active installs3K
Developer Profile

Peter’s Post Notes Developer Profile

Peter

5 plugins · 4K total installs

80
trust score
Avg Security Score
89/100
Avg Patch Time
35 days
View full developer profile
Detection Fingerprints

How We Detect Peter’s Post Notes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/peters-post-notes/css/ppn-style.css/wp-content/plugins/peters-post-notes/js/ppn-scripts.js
Script Paths
/wp-content/plugins/peters-post-notes/js/ppn-scripts.js
Version Parameters
peters-post-notes/css/ppn-style.css?ver=peters-post-notes/js/ppn-scripts.js?ver=

HTML / DOM Fingerprints

CSS Classes
ppn_add_noteppn_add_general_noteppn_notes_listppn_note_delete_buttonppn_note_edit_buttonppn_note_reply_buttonppn_note_general_listppn_note_general_delete_button+6 more
HTML Comments
<!-- As of version 1.5.0 of this plugin and higher, all settings are configured in "Settings" > "Peter's Post Notes" in the WordPress admin panel --><!-- If the user does not exist (if they've been removed, for example, show a default name) --><!-- This function is a copy of wp_kses_data that was introduced in WordPress 2.9 --><!-- It's copied in this plugin to retain compatibility with WordPress 2.8 -->+7 more
Data Attributes
data-ppn-note-iddata-ppn-general-note-id
JS Globals
ppn_ajax_urlppn_nonce_delete_noteppn_nonce_edit_noteppn_nonce_add_noteppn_nonce_update_settingsppn_nonce_delete_general_note+2 more
FAQ

Frequently Asked Questions about Peter’s Post Notes