PlacePress Security & Risk Analysis

wordpress.org/plugins/placepress

An elegant mapping solution for public historians, urbanists, and other humanities researchers.

30 active installs v1.4.96 PHP 7.4.3+ WP 5.0+ Updated Dec 1, 2025
digital-humanitieshistorymapplacepresspublic
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PlacePress Safe to Use in 2026?

Generally Safe

Score 100/100

PlacePress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The PlacePress plugin v1.4.96 exhibits a strong security posture based on the provided static analysis. The complete absence of identified attack surface points (AJAX handlers, REST API routes, shortcodes, cron events) is highly commendable, indicating a minimal exposure to external manipulation. Furthermore, the analysis shows no dangerous functions, raw SQL queries, or file operations, and a complete lack of external HTTP requests. The presence of capability checks (3 instances) suggests some attention to authorization, although the lack of nonce checks across any entry points is a notable omission, especially if any hidden or unintended entry points exist.

The taint analysis reports zero flows, which is a positive indicator that sensitive data is not being processed in an insecure manner. The vulnerability history being completely clean (0 CVEs) also points to a plugin that has historically been maintained securely or has not attracted malicious attention. The significant percentage of properly escaped output (57%) is a concern, as a substantial portion (43%) could potentially lead to cross-site scripting (XSS) vulnerabilities if the unescaped data is rendered in a user-facing context without further sanitization.

In conclusion, PlacePress v1.4.96 demonstrates good security practices by minimizing its attack surface and avoiding common pitfalls like raw SQL. However, the unescaped output presents a tangible risk, and the absence of nonce checks, while not directly evidenced as exploitable due to the lack of identified entry points, represents a potential weakness. The clean vulnerability history is a strong positive, but the output escaping issue should be addressed to solidify its security.

Key Concerns

  • Significant portion of output not properly escaped
  • Missing nonce checks
Vulnerabilities
None known

PlacePress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

PlacePress Release Timeline

v1.4.96Current
v1.4.95
v1.4.8
v1.4.7
v1.4.6
v1.4.5
v1.4.4
v1.4.3
v1.4.2
v1.4.1
v1.4.0
v1.3.9
v1.3.8
v1.3.7
v1.3.6
v1.3.5
v1.3.4
v1.3.3
v1.3.2
v1.3.1
Code Analysis
Analyzed Mar 16, 2026

PlacePress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
37 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped65 total outputs
Attack Surface

PlacePress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 27
actiondashboard_glance_itemsadmin\dashboard.php:5
actionadmin_head-nav-menus.phpadmin\menus.php:5
actioninitadmin\metaboxes.php:6
filteris_protected_metaadmin\metaboxes.php:20
actioninitadmin\post_types.php:6
actionupgrader_process_completeadmin\settings\settings.php:12
actionadmin_menuadmin\settings\settings.php:42
actionadmin_initadmin\settings\settings.php:77
actioninitadmin\settings\settings.php:316
actionadmin_headadmin\settings\settings.php:645
actioninitapi\output.php:7
actionedit_termsapi\output.php:14
actionsave_postapi\output.php:15
actiondeleted_postapi\output.php:16
actiontransition_post_statusapi\output.php:17
filterrender_blockfilters\filters.php:10
filterget_the_archive_titlefilters\filters.php:30
actionpre_get_postshooks\hooks.php:11
actionplugin_loadedlanguages\languages.php:5
filterblock_categories_allplacepress-blocks\src\init.php:30
actionenqueue_block_assetsplacepress-blocks\src\init.php:94
actionenqueue_block_editor_assetsplacepress-blocks\src\init.php:133
actionadmin_enqueue_scriptsplacepress-blocks\src\init.php:176
actionadmin_enqueue_scriptsplacepress-blocks\src\init.php:177
actionadmin_enqueue_scriptsplacepress-blocks\src\init.php:178
actionadmin_initplacepress.php:168
actionwidgets_initwidgets\widgets.php:106
Maintenance & Trust

PlacePress Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version7.4.3
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

PlacePress Developer Profile

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PlacePress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/placepress/javascripts/leaflet@1.9.3/leaflet.css/wp-content/plugins/placepress/javascripts/leaflet@1.9.3/leaflet.js/wp-content/plugins/placepress/javascripts/leaflet.markercluster@1.4.1/MarkerCluster.css/wp-content/plugins/placepress/javascripts/leaflet.markercluster@1.4.1/MarkerCluster.Default.css/wp-content/plugins/placepress/javascripts/leaflet.markercluster@1.4.1/leaflet.markercluster.js/wp-content/plugins/placepress/placepress-blocks/src/tile-provider.js/wp-content/plugins/placepress/placepress-blocks/src/placepress.js/wp-content/plugins/placepress/admin/settings/settings.js+1 more
Script Paths
/wp-content/plugins/placepress/placepress-blocks/src/placepress.js/wp-content/plugins/placepress/admin/settings/settings.js

HTML / DOM Fingerprints

CSS Classes
placepress-map-container
Data Attributes
data-placepress-settingdata-placepress-map-id
JS Globals
placepress_scripts_vars
FAQ

Frequently Asked Questions about PlacePress