Post of the Day Security & Risk Analysis

wordpress.org/plugins/post-of-the-day

Plugin to display a random post from a particular category.

20 active installs v1.0 PHP + WP 3.2.1+ Updated Unknown
post-of-the-dayrandom-postrotating-poststestimonials
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post of the Day Safe to Use in 2026?

Generally Safe

Score 100/100

Post of the Day has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'post-of-the-day' v1.0 plugin demonstrates some positive security practices, such as no recorded vulnerabilities and a small attack surface. The static analysis indicates a low number of entry points, with no unprotected AJAX handlers or REST API routes. The absence of dangerous functions, file operations, and external HTTP requests is also a positive sign. However, the analysis also reveals significant areas of concern. Notably, only 44% of SQL queries use prepared statements, leaving a substantial portion vulnerable to SQL injection. Furthermore, a very low percentage (27%) of output is properly escaped, increasing the risk of cross-site scripting (XSS) vulnerabilities. The plugin also lacks capability checks on its shortcode, meaning any user, regardless of their role, could potentially trigger its functionality. This lack of proper authorization for the shortcode, combined with the SQL and output escaping issues, presents a notable security risk.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
  • Shortcode without capability checks
Vulnerabilities
None known

Post of the Day Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post of the Day Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
4 prepared
Unescaped Output
8
3 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

44% prepared9 total queries

Output Escaping

27% escaped11 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<potd-admin> (potd-admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post of the Day Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[potd] post-of-the-day.php:305
WordPress Hooks 4
actioninitpost-of-the-day.php:38
actionplugins_loadedpost-of-the-day.php:39
actionadmin_menupost-of-the-day.php:40
actionupdate_option_potd_categoriespost-of-the-day.php:41
Maintenance & Trust

Post of the Day Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating40/100
Number of ratings1
Active installs20
Developer Profile

Post of the Day Developer Profile

mdavison

2 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post of the Day

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-of-the-day/post-of-the-day.js
Script Paths
/wp-content/plugins/post-of-the-day/post-of-the-day.js
Version Parameters
post-of-the-day/post-of-the-day.js?ver=

HTML / DOM Fingerprints

CSS Classes
potd_titlepotd_content
Shortcode Output
[potd]
FAQ

Frequently Asked Questions about Post of the Day