
Post Lockdown Security & Risk Analysis
wordpress.org/plugins/post-lockdownAllows admins to protect selected posts and pages so they cannot be trashed or deleted by non-admin users.
Is Post Lockdown Safe to Use in 2026?
Generally Safe
Score 99/100Post Lockdown has a strong security track record. Known vulnerabilities have been patched promptly.
The static analysis of post-lockdown v4.0.5 reveals a generally strong security posture. The plugin exhibits excellent adherence to secure coding practices by having no dangerous functions, utilizing prepared statements for all SQL queries, properly escaping all output, and performing no file operations or external HTTP requests. The presence of a nonce check and capability checks further reinforces this good practice. Crucially, the absence of any identified taint flows, particularly those with unsanitized paths or critical/high severity, is a significant positive indicator. The attack surface is also commendably small and entirely protected.
However, the plugin's vulnerability history presents a significant concern. While there are no currently unpatched vulnerabilities, the existence of one previously known CVE, specifically a 'Missing Authorization' type with a medium severity, indicates a past weakness. The fact that this was the last recorded vulnerability suggests that while it has been addressed, the underlying codebase had a susceptibility to authorization issues. This historical pattern, even with a patch, warrants a degree of caution.
In conclusion, post-lockdown v4.0.5 demonstrates excellent technical security implementation in its current version. The lack of identified code-level risks is commendable. The primary weakness lies in its past vulnerability history. While the single medium-severity 'Missing Authorization' vulnerability has been patched, it highlights a potential area for scrutiny, and a residual risk might exist if similar architectural patterns were not fully remediated. Overall, it's a well-coded plugin with a historical caveat.
Key Concerns
- Past medium severity vulnerability (Missing Authorization)
Post Lockdown Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Post Lockdown <= 4.0.2 - Missing Authorization to Authenticated (Subscriber+) Post Disclosure
Post Lockdown Code Analysis
Output Escaping
Post Lockdown Attack Surface
WordPress Hooks 13
Maintenance & Trust
Post Lockdown Maintenance & Trust
Maintenance Signals
Community Trust
Post Lockdown Alternatives
Force Delete Posts
force-delete-posts
Deleting Posts has never been so fast! This lightweight plugin adds the ability for administrators to instantly delete posts by adding a Force Delete …
Bulk Trash by URL
bulk-trash-by-url
Bulk‑trash posts, pages and custom post types from pasted URLs. Fast URL mapping, batched processing with pause/resume, and an optional summary.
Trash Post in Block Editor
trash-post-in-block-editor
Delete a Post from within the WP Block Editor with just a few clicks, making content management easier and more efficient.
Disable Comments – Remove Comments & Stop Spam [Multi-Site Support]
disable-comments
Allows administrators to globally disable comments on their site. Comments can be disabled according to post type. Multisite friendly.
GenerateBlocks
generateblocks
A small collection of lightweight WordPress blocks that can accomplish nearly anything.
Post Lockdown Developer Profile
1 plugin · 1K total installs
How We Detect Post Lockdown
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/post-lockdown/view/assets/postlockdown.css/wp-content/plugins/post-lockdown/view/assets/postlockdown.js/wp-content/plugins/post-lockdown/view/assets/postlockdown.jspostlockdown.css?ver=postlockdown.js?ver=HTML / DOM Fingerprints
<!-- Locked Posts --><!-- Protected Posts -->data-pl-locked-post-idsdata-pl-protected-post-idswindow.postlockdownvar postlockdown/wp-json/postlockdown/v1/posts