Post Display Security & Risk Analysis

wordpress.org/plugins/post-display

Plugin Display Post with multiple layouts order by date, title, random... Developer can override HTML or create new layout in their theme.

30 active installs v1.0.0 PHP + WP 3.0.1+ Updated Nov 27, 2015
contentcontent-displaypost-viewswordpress-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Display Safe to Use in 2026?

Generally Safe

Score 85/100

Post Display has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'post-display' plugin v1.0.0 exhibits a generally good security posture, particularly in its handling of entry points. All identified AJAX handlers and REST API routes appear to have authentication checks, and there are no unauthenticated REST API routes. The plugin also demonstrates a commitment to secure coding practices with a high percentage of SQL queries using prepared statements and a significant number of nonce checks. The absence of any recorded vulnerabilities in its history is a positive indicator of its current stability and the development team's attention to security.

However, there are notable areas for improvement. The presence of 8 instances of the 'unserialize' function is a significant concern, as it can be a vector for remote code execution if untrusted data is unserialized. Furthermore, only 32% of output is properly escaped, leaving room for potential Cross-Site Scripting (XSS) vulnerabilities. While taint analysis found no unsanitized flows, the presence of 'unserialize' and insufficient output escaping warrants careful scrutiny.

In conclusion, while the plugin has strengths in its protected entry points and secure SQL query practices, the potential risks associated with 'unserialize' and the low output escaping rate are critical weaknesses that should be addressed to ensure a robust security profile. The clean vulnerability history is encouraging but does not negate the inherent risks in the identified code signals.

Key Concerns

  • Dangerous function 'unserialize' used
  • Low percentage of properly escaped output
Vulnerabilities
None known

Post Display Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Display Code Analysis

Dangerous Functions
8
Raw SQL Queries
5
21 prepared
Unescaped Output
64
30 escaped
Nonce Checks
9
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$plist = unserialize($res1[0]->plist);post-display.php:260
unserialize$query = unserialize($res1[0]->query);post-display.php:261
unserialize$container = unserialize($res1[0]->container);post-display.php:262
unserialize$content = unserialize($res1[0]->content);post-display.php:263
unserialize$plist = unserialize($dset->plist);templates\template-default.php:23
unserialize$query = unserialize($dset->query);templates\template-default.php:24
unserialize$container = unserialize($dset->container);templates\template-default.php:25
unserialize$content = unserialize($dset->content);templates\template-default.php:26

SQL Query Safety

81% prepared26 total queries

Output Escaping

32% escaped94 total outputs
Data Flows
All sanitized

Data Flow Analysis

4 flows
tzpostUpdateLabel (post-display.php:107)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Display Attack Surface

Entry Points6
Unprotected0

AJAX Handlers 5

authwp_ajax_tzpostchkCategorypost-display.php:101
authwp_ajax_tzpostUpdateLabelpost-display.php:102
authwp_ajax_tzpostUpdateOptpost-display.php:103
authwp_ajax_tzpostListPostpost-display.php:104
authwp_ajax_tzpostupdateSmethodpost-display.php:105

Shortcodes 1

[tzpost-display] post-display.php:352
WordPress Hooks 6
actionadmin_menupost-display.php:19
actionwp_enqueue_scriptspost-display.php:42
actionadmin_enqueue_scriptspost-display.php:68
actionwp_loadedpost-display.php:91
actionwp_headpost-display.php:248
filterimage_resize_dimensionstzpost_resizer.php:61
Maintenance & Trust

Post Display Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 27, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs30
Developer Profile

Post Display Developer Profile

tuyennv

7 plugins · 1K total installs

81
trust score
Avg Security Score
82/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Display

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-display/tzpost-style.css/wp-content/plugins/post-display/js/tzpost.frnt.script.js/wp-content/plugins/post-display/js/tzpost.script.js/wp-content/plugins/post-display/css/tzcustom_display_admin.css
Script Paths
/wp-content/plugins/post-display/js/tzpost.frnt.script.js/wp-content/plugins/post-display/js/tzpost.script.js

HTML / DOM Fingerprints

Data Attributes
name="tzpost_category[]"name="tzpost-js-script"data-tzpost-ajax-nonce
JS Globals
tzpostajx
FAQ

Frequently Asked Questions about Post Display