Post Admin View Count Security & Risk Analysis

wordpress.org/plugins/post-admin-view-count

Adds a sortable column to the admin's post manager, displaying the view count for each post.

10 active installs v1.0 PHP + WP 3.0+ Updated Aug 28, 2012
columncountview-countviewswordcount
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Admin View Count Safe to Use in 2026?

Generally Safe

Score 85/100

Post Admin View Count has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "post-admin-view-count" v1.0 plugin exhibits a generally good security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the analysis indicates no dangerous functions, file operations, external HTTP requests, or known vulnerabilities, which are all positive indicators. The plugin also demonstrates a commitment to security by using prepared statements for all SQL queries and showing no critical or high severity taint flows.

However, a significant concern arises from the output escaping. With one total output and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the plugin that is not properly sanitized could be exploited by attackers to inject malicious scripts, potentially leading to session hijacking or unauthorized actions. The lack of capability checks and nonce checks, while not directly exploitable given the limited attack surface reported, is a deviation from best practices for WordPress security and could become a vulnerability if the attack surface were to expand in future versions.

In conclusion, while the plugin has a strong foundation in secure coding practices concerning SQL and taint analysis, the critical lack of output escaping is a major weakness that needs immediate attention. The absence of known vulnerabilities is a positive sign, but it doesn't negate the inherent risk posed by unescaped output. Addressing the XSS vulnerability should be the top priority.

Key Concerns

  • Unescaped output detected
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Post Admin View Count Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Post Admin View Count Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 17, 2026

Post Admin View Count Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Post Admin View Count Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filtermanage_edit-post_sortable_columnspost-admin-view-count.php:15
filterposts_orderbypost-admin-view-count.php:16
filtermanage_posts_columnspost-admin-view-count.php:17
actionmanage_posts_custom_columnpost-admin-view-count.php:18
actionadmin_footer-edit.phppost-admin-view-count.php:19
actionadmin_head-edit.phppost-admin-view-count.php:20
Maintenance & Trust

Post Admin View Count Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedAug 28, 2012
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Post Admin View Count Developer Profile

Jon Bishop

7 plugins · 4K total installs

83
trust score
Avg Security Score
93/100
Avg Patch Time
89 days
View full developer profile
Detection Fingerprints

How We Detect Post Admin View Count

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post Admin View Count