Post Filter Security & Risk Analysis

wordpress.org/plugins/post-filter

Prevent from publishing posts with unwanted content/words Delete posts on your WordPress blog by keyword immediately after published

10 active installs v1.1.0 PHP + WP 2.7+ Updated Mar 5, 2012
deletekeywordspostpostsseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Filter Safe to Use in 2026?

Generally Safe

Score 85/100

Post Filter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The security posture of post-filter v1.1.0 presents a mixed bag of good practices and significant concerns. On the positive side, the plugin demonstrates a strong adherence to secure database practices with 100% of SQL queries utilizing prepared statements and a lack of file operations or external HTTP requests. Furthermore, the absence of known CVEs and a clean vulnerability history are encouraging indicators of past security diligence. However, the static analysis reveals critical weaknesses that overshadow these strengths.

The presence of the `unserialize` function without any apparent sanitization or capability checks is a major red flag. This function, when used with untrusted input, can lead to Remote Code Execution (RCE) vulnerabilities. Compounding this issue is the fact that 100% of output is not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of any nonce or capability checks across its limited attack surface, while seemingly benign given the absence of entry points, means that if any were introduced in the future without proper security, they would be immediately exploitable.

In conclusion, while the plugin avoids common pitfalls like raw SQL and known vulnerabilities, the identified use of `unserialize` and universally unescaped output creates a substantial security risk. These are critical vulnerabilities that could be exploited to compromise WordPress sites. The plugin would require immediate remediation to address these specific issues to be considered secure.

Key Concerns

  • Unescaped output on all outputs
  • Dangerous function 'unserialize' used
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Post Filter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Filter Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->options = (array)(is_serialized($stored_options)) ? unserialize($stored_options) : $stored_oppost-filter.php:21

Output Escaping

0% escaped3 total outputs
Attack Surface

Post Filter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menupost-filter.php:26
actionpublish_postpost-filter.php:27
Maintenance & Trust

Post Filter Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMar 5, 2012
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Filter Developer Profile

mlazarov

10 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Filter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post Filter