Post Hierarchy Nav Security & Risk Analysis

wordpress.org/plugins/post-hierarchy-nav

Display dynamic, hierarchical navigation trees for posts, pages, and custom post types - directly in the Gutenberg editor.

0 active installs v1.0.0 PHP 8.2+ WP 6.3+ Updated Unknown
gutenbergmenunavigationpost-hierarchysidebar
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Hierarchy Nav Safe to Use in 2026?

Generally Safe

Score 100/100

Post Hierarchy Nav has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "post-hierarchy-nav" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, or improperly escaped output is commendable. Furthermore, the plugin has no reported vulnerability history, indicating a clean record and potentially robust development practices. The attack surface is minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, further reducing the opportunities for exploitation.

However, a significant concern arises from the complete lack of nonce checks and capability checks. While the current attack surface is small, this omission leaves the plugin vulnerable to various CSRF (Cross-Site Request Forgery) attacks should any functionality be added in the future without proper authorization checks. The absence of taint analysis results might be due to the plugin's simplicity or the limitations of the analysis tools used, but it's generally a good indicator when even simple plugins undergo this process to confirm the absence of critical vulnerabilities.

In conclusion, the plugin is currently very secure due to its limited functionality and lack of exploitable code patterns. Its vulnerability history is also a positive sign. The primary weakness lies in the missing authentication and authorization checks, which, while not currently leading to exploitable issues, represent a significant security debt that could become problematic if the plugin evolves or is integrated into larger systems. It is important to address this proactively to maintain a high security standard.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Post Hierarchy Nav Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Hierarchy Nav Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

Post Hierarchy Nav Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitincludes\Blocks\NavigationBlock.php:8
Maintenance & Trust

Post Hierarchy Nav Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedUnknown
PHP min version8.2
Downloads135

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Post Hierarchy Nav Developer Profile

Yalogica

11 plugins · 110 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Post Hierarchy Nav

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
post-hierarchy-nav/style.css?ver=post-hierarchy-nav/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post Hierarchy Nav