Popular Posts Security & Risk Analysis

wordpress.org/plugins/popular-posts-plugin

Popular Posts displays a list of your blog's most-viewed posts. The output can be customised in many ways.

1K active installs v2.6.2.0 PHP + WP 1.5+ Updated Nov 28, 2017
bestmost-viewedpopularpopular-postsposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Popular Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Popular Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'popular-posts-plugin' v2.6.2.0 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and a lack of identified critical or high severity vulnerabilities in its history suggest a well-maintained and secure codebase. Static analysis reveals no direct attack surface from entry points like AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests mitigates common attack vectors. However, the plugin's code signals do present some areas for concern. A significant portion of SQL queries are not prepared, posing a potential risk for SQL injection vulnerabilities if user input is directly incorporated. Additionally, the output escaping is very low, with only 3% of outputs being properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without sanitization. While the plugin has nonce checks, the lack of capability checks on potential entry points (though none are explicitly listed as unprotected) remains a theoretical weakness if new entry points were to be introduced without proper authorization controls.

In conclusion, the plugin demonstrates strengths in its lack of known vulnerabilities and a minimal attack surface. The primary weaknesses identified lie in the handling of SQL queries and output escaping, which could be exploited to introduce security flaws. Addressing these areas through robust input validation, prepared statements for all database interactions, and comprehensive output escaping would significantly enhance the plugin's overall security.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
Vulnerabilities
None known

Popular Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Popular Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
29
1 escaped
Nonce Checks
5
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

3% escaped30 total outputs
Attack Surface

Popular Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menupopular-posts-admin.php:9
actionin_admin_footerpopular-posts-admin.php:27
actionplugins_loadedpopular-posts.php:253
actionloop_startpopular-posts.php:295
actioninitpopular-posts.php:309
Maintenance & Trust

Popular Posts Maintenance & Trust

Maintenance Signals

WordPress version tested2.6.2
Last updatedNov 28, 2017
PHP min version
Downloads84K

Community Trust

Rating100/100
Number of ratings1
Active installs1K
Developer Profile

Popular Posts Developer Profile

RobMarsh

5 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Popular Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- popular Posts took %.3f ms (cached) --><!-- popular Posts took %.3f ms -->
Shortcode Output
<li>{link}</li>
FAQ

Frequently Asked Questions about Popular Posts