Populist Security & Risk Analysis

wordpress.org/plugins/populist

Track the popularity of your posts on social bookmarking sites reddit, stumbleupon, del.icio.us and digg

10 active installs v1.5.1 PHP + WP 2.5+ Updated Unknown
deliciousdiggredditstatsstumbleupon
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Populist Safe to Use in 2026?

Generally Safe

Score 100/100

Populist has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The populist plugin v1.5.1 presents a mixed security posture. While the static analysis shows a remarkably small attack surface with no apparent direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication, there are significant concerns within the code itself. The presence of two 'dangerous functions' (preg_replace with the /e modifier) and a complete lack of output escaping are particularly worrying. Taint analysis reveals two flows with unsanitized paths, indicating potential for command injection or other code execution vulnerabilities if these paths are reachable. The plugin's vulnerability history is clean, with no recorded CVEs. This could indicate good development practices or simply a lack of past scrutiny. However, the internal code signals, especially the lack of output escaping and the identified unsanitized flows, suggest that the plugin may have undiscovered vulnerabilities that could be exploited. Therefore, despite the absence of a known exploitable history, the internal code quality raises significant red flags.

Key Concerns

  • Dangerous function: preg_replace(/e)
  • Taint flow with unsanitized paths (High severity)
  • Taint flow with unsanitized paths (High severity)
  • 0% of output properly escaped
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

Populist Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Populist Code Analysis

Dangerous Functions
2
Raw SQL Queries
1
1 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace("/\{WHITESPACE-([0-9]+)\}/e"functions.php:50
preg_replace(/e)preg_replace("/(\s)/e"functions.php:58

SQL Query Safety

50% prepared2 total queries

Output Escaping

0% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
popu_list (PopuList.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Populist Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuPopuList.php:125
Maintenance & Trust

Populist Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Populist Developer Profile

johnlawrence

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Populist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/populist/digg.php/wp-content/plugins/populist/delicious.php/wp-content/plugins/populist/reddit.php/wp-content/plugins/populist/stumble.php/wp-content/plugins/populist/goobl.php/wp-content/plugins/populist/yahoobl.php/wp-content/plugins/populist/functions.php/wp-content/plugins/populist/style.php

HTML / DOM Fingerprints

CSS Classes
slmodulehndleinsidetabnavtab1tab2
Data Attributes
id="tabnav"id="gooblbox"id="yahblbox"id="diggbox"id="delbox"id="redbox"+1 more
FAQ

Frequently Asked Questions about Populist