
PixTypes Security & Risk Analysis
wordpress.org/plugins/pixtypesA WordPress plugin for managing custom post types and custom meta boxes from a theme.
Is PixTypes Safe to Use in 2026?
Generally Safe
Score 99/100PixTypes has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The pixtypes v2.0.0 plugin exhibits a generally strong security posture, evidenced by the absence of unpatched CVEs and a high percentage of properly escaped output. The code analysis reveals a clean slate regarding dangerous functions, raw SQL queries, file operations, and external HTTP requests. Furthermore, all identified AJAX handlers and REST API routes appear to have appropriate authentication checks in place, contributing to a limited attack surface with no immediately obvious unprotected entry points. The presence of nonce and capability checks further reinforces the plugin's defensive measures.
However, the taint analysis does raise some concerns. While no critical severity flows were detected, the presence of two high-severity flows with unsanitized paths indicates potential weaknesses where user-supplied input could be manipulated in unintended ways. The vulnerability history, while not currently featuring unpatched critical or high-severity issues, does show a past of medium-severity Cross-site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities. This historical pattern, coupled with the current high-severity taint flows, suggests a recurring need for diligent input validation and output encoding to prevent these types of attacks.
In conclusion, pixtypes v2.0.0 demonstrates good security practices in many areas, particularly in its handling of core database and file operations, and its adherence to authentication mechanisms. The plugin's vulnerability history and current taint analysis, however, highlight areas that require continued vigilance. Addressing the identified high-severity taint flows and maintaining robust input sanitization will be crucial for ensuring long-term security and preventing the recurrence of past vulnerability types.
Key Concerns
- High severity taint flows with unsanitized paths
- Medium severity vulnerabilities in history (XSS, CSRF)
- Bundled outdated library (Select2 v1.0.1)
PixTypes Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
PixTypes <= 1.4.15 - Reflected Cross-Site Scripting
PixTypes <= 1.4.14 - Cross-Site Request Forgery
PixTypes Release Timeline
PixTypes Code Analysis
Bundled Libraries
Output Escaping
Data Flow Analysis
PixTypes Attack Surface
AJAX Handlers 4
WordPress Hooks 31
Maintenance & Trust
PixTypes Maintenance & Trust
Maintenance Signals
Community Trust
PixTypes Alternatives
Apollo13 Framework Extensions
apollo13-framework-extensions
Adds custom post types, shortcodes and some features that are used in themes built on Apollo13 Framework.
JSM Show Post Metadata
jsm-show-post-meta
Show post metadata (aka custom fields) in a metabox when editing posts / pages - a great tool for debugging issues with post metadata.
WebMan Amplifier
webman-amplifier
Amplifies functionality of WP themes. Provides custom post types, shortcodes, metaboxes, icons. Theme developer's best friend!
Display post meta, term meta, comment meta, and user meta
display-metadata
Displays metadata in a metabox on the creation/editing pages for posts (any CPT), terms (any taxonomy), and users. The metadata is shown in a human-re …
Floorplans
floorplans
Create a catalog of sortable, filterable, and searchable floorplans with image and video galleries.
PixTypes Developer Profile
8 plugins · 37K total installs
How We Detect PixTypes
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2/js/select2/select2.min.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2/js/select2-init.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2/js/select2/select2.css/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2/css/select2.css/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2/select2.full.min.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2-init.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2/select2.css/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2-v2/css/select2.css/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2/js/select2/select2.min.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2/js/select2-init.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2/select2.full.min.js/wp-content/plugins/pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2-init.jspixtypes/features/metaboxes/cmb-field-select2/js/select2/select2.min.js?ver=pixtypes/features/metaboxes/cmb-field-select2/js/select2/select2.css?ver=pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2/select2.full.min.js?ver=pixtypes/features/metaboxes/cmb-field-select2-v2/js/select2/select2.css?ver=HTML / DOM Fingerprints
select2data-placeholderdata-allow-clearpw_select2_datapw_multiselect_datapw_multiselect_cpt_datapw_select2_v2_datapw_multiselect_v2_datapw_multiselect_cpt_v2_data