Post Format Options Security & Risk Analysis

wordpress.org/plugins/post-format-options

Easily disable post formats or allow certain roles access to only certain formats.

10 active installs v0.1 PHP + WP 3.6+ Updated Apr 12, 2013
manage-post-formatspost-formatspost-formattingpost-formatting-optionsvideo-format
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Format Options Safe to Use in 2026?

Generally Safe

Score 85/100

Post Format Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of the "post-format-options" v0.1 plugin reveals a seemingly robust security posture with a notably small attack surface. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits potential entry points for attackers. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and avoiding file operations and external HTTP requests.

However, a significant concern arises from the complete lack of nonce and capability checks. This means that any functionality within the plugin, even if it were to be exposed through an as-yet-undiscovered entry point, would not have any built-in authorization or protection against cross-site request forgery attacks. The 50% rate of properly escaped output also indicates a potential for cross-site scripting (XSS) vulnerabilities if the unescaped outputs were to contain user-supplied data.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the clean taint analysis, suggests that in its current state and version, there are no known exploitable vulnerabilities. However, the absence of vulnerabilities does not equate to an absence of risk, especially given the lack of robust security controls like nonces and capability checks. The plugin has strengths in its limited attack surface and secure data handling, but its weaknesses lie in the lack of essential authorization and authentication mechanisms.

Key Concerns

  • No Nonce Checks detected
  • No Capability Checks detected
  • 50% of output not properly escaped
Vulnerabilities
None known

Post Format Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Format Options Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Post Format Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menupost-format-options.php:33
actionadmin_initpost-format-options.php:34
filtershow_post_format_uipost-format-options.php:56
Maintenance & Trust

Post Format Options Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedApr 12, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Format Options Developer Profile

Taylor Lovett

9 plugins · 8K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
3845 days
View full developer profile
Detection Fingerprints

How We Detect Post Format Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
post-format-options
FAQ

Frequently Asked Questions about Post Format Options