Post Category Security & Risk Analysis

wordpress.org/plugins/post-category

Use Shortcode to Loop Post From specific Categorie.

40 active installs v1.0 PHP + WP 2.9+ Updated Aug 1, 2016
categoryfilterlooppost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Category Safe to Use in 2026?

Generally Safe

Score 85/100

Post Category has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'post-category' plugin version 1.0 presents a generally good security posture based on the static analysis, with no direct critical vulnerabilities identified. The absence of dangerous functions, file operations, external HTTP requests, and SQL queries without prepared statements are positive indicators. The presence of a nonce check and a limited attack surface (solely a shortcode) further contribute to its perceived safety. However, a significant concern arises from the output escaping, where only 18% of outputs are properly escaped, suggesting a potential for Cross-Site Scripting (XSS) vulnerabilities. While no direct evidence of exploitable XSS was found in the taint analysis (all flows were critical/high or not applicable), the low rate of proper output escaping remains a considerable risk. The plugin's clean vulnerability history is encouraging but doesn't entirely mitigate the risks identified in the code analysis, especially regarding output sanitization.

Key Concerns

  • Low percentage of properly escaped output
  • Unsanitized paths found in taint analysis
Vulnerabilities
None known

Post Category Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Post Category Release Timeline

v1.0.1
Code Analysis
Analyzed Mar 16, 2026

Post Category Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
41
9 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

18% escaped50 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
naples_post (inc\naplespost.php:2)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Category Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[postcat] Post-Category.php:17
WordPress Hooks 3
actionsave_postinc\naples_generate.php:295
actionadd_meta_boxesinc\naples_post_fields.php:13
actioninitinc\naples_register_post.php:47
Maintenance & Trust

Post Category Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedAug 1, 2016
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings3
Active installs40
Developer Profile

Post Category Developer Profile

naples

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Category

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
naples_createtitle_sizeimgwimghpostncc+6 more
Shortcode Output
[postcat
FAQ

Frequently Asked Questions about Post Category