Post Lockdown Security & Risk Analysis

wordpress.org/plugins/post-lockdown

Allows admins to protect selected posts and pages so they cannot be trashed or deleted by non-admin users.

1K active installs v4.0.5 PHP 7.4+ WP 4.6+ Updated Jan 12, 2026
deletelockpostsprotecttrash
99
A · Safe
CVEs total1
Unpatched0
Last CVEMar 7, 2025
Safety Verdict

Is Post Lockdown Safe to Use in 2026?

Generally Safe

Score 99/100

Post Lockdown has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Mar 7, 2025Updated 2mo ago
Risk Assessment

The static analysis of post-lockdown v4.0.5 reveals a generally strong security posture. The plugin exhibits excellent adherence to secure coding practices by having no dangerous functions, utilizing prepared statements for all SQL queries, properly escaping all output, and performing no file operations or external HTTP requests. The presence of a nonce check and capability checks further reinforces this good practice. Crucially, the absence of any identified taint flows, particularly those with unsanitized paths or critical/high severity, is a significant positive indicator. The attack surface is also commendably small and entirely protected.

However, the plugin's vulnerability history presents a significant concern. While there are no currently unpatched vulnerabilities, the existence of one previously known CVE, specifically a 'Missing Authorization' type with a medium severity, indicates a past weakness. The fact that this was the last recorded vulnerability suggests that while it has been addressed, the underlying codebase had a susceptibility to authorization issues. This historical pattern, even with a patch, warrants a degree of caution.

In conclusion, post-lockdown v4.0.5 demonstrates excellent technical security implementation in its current version. The lack of identified code-level risks is commendable. The primary weakness lies in its past vulnerability history. While the single medium-severity 'Missing Authorization' vulnerability has been patched, it highlights a potential area for scrutiny, and a residual risk might exist if similar architectural patterns were not fully remediated. Overall, it's a well-coded plugin with a historical caveat.

Key Concerns

  • Past medium severity vulnerability (Missing Authorization)
Vulnerabilities
1

Post Lockdown Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-1504medium · 4.3Missing Authorization

Post Lockdown <= 4.0.2 - Missing Authorization to Authenticated (Subscriber+) Post Disclosure

Mar 7, 2025 Patched in 4.0.3 (7d)
Code Analysis
Analyzed Mar 16, 2026

Post Lockdown Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
27 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped27 total outputs
Attack Surface

Post Lockdown Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_noticessrc\PostLockdown\AdminNotice.php:15
filterremovable_query_argssrc\PostLockdown\AdminNotice.php:16
actionadmin_initsrc\PostLockdown\BulkActions.php:14
actionadmin_initsrc\PostLockdown\OptionsPage.php:18
actionadmin_menusrc\PostLockdown\OptionsPage.php:19
actionadmin_enqueue_scriptssrc\PostLockdown\OptionsPage.php:21
filteradmin_footer_textsrc\PostLockdown\OptionsPage.php:26
actiondelete_postsrc\PostLockdown\PostLockdown.php:34
filteruser_has_capsrc\PostLockdown\PostLockdown.php:35
filterwp_insert_post_datasrc\PostLockdown\PostLockdown.php:36
filterredirect_post_locationsrc\PostLockdown\PostLockdown.php:361
actionadmin_initsrc\PostLockdown\StatusColumn.php:15
actionadmin_headsrc\PostLockdown\StatusColumn.php:16
Maintenance & Trust

Post Lockdown Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 12, 2026
PHP min version7.4
Downloads22K

Community Trust

Rating92/100
Number of ratings9
Active installs1K
Developer Profile

Post Lockdown Developer Profile

andyexeter

1 plugin · 1K total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
7 days
View full developer profile
Detection Fingerprints

How We Detect Post Lockdown

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-lockdown/view/assets/postlockdown.css/wp-content/plugins/post-lockdown/view/assets/postlockdown.js
Script Paths
/wp-content/plugins/post-lockdown/view/assets/postlockdown.js
Version Parameters
postlockdown.css?ver=postlockdown.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Locked Posts --><!-- Protected Posts -->
Data Attributes
data-pl-locked-post-idsdata-pl-protected-post-ids
JS Globals
window.postlockdownvar postlockdown
REST Endpoints
/wp-json/postlockdown/v1/posts
FAQ

Frequently Asked Questions about Post Lockdown