Post Order Manager Security & Risk Analysis

wordpress.org/plugins/post-order-manager

Reorder posts using a simple drag-and-drop interface and update the menu_order field in seconds.

0 active installs v1.0.1 PHP 7.2+ WP 5.5+ Updated Jul 11, 2025
admincustom-orderdrag-and-dropmenu_orderpost-order
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Post Order Manager Safe to Use in 2026?

Generally Safe

Score 100/100

Post Order Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The "post-order-manager" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The code analysis reveals excellent adherence to security best practices, with all identified outputs being properly escaped, and SQL queries exclusively using prepared statements. Furthermore, there are no file operations or external HTTP requests, which significantly reduces the attack surface. The presence of nonce and capability checks on the single AJAX entry point indicates a good effort to prevent unauthorized access and actions.

The vulnerability history is equally positive, showing zero known CVEs of any severity. This, combined with the clean static analysis, suggests that the plugin has been developed with security in mind and has likely undergone thorough vetting or has not been a target for exploitation. The absence of taint analysis findings further reinforces this conclusion, indicating no identified pathways for unsanitized data to reach sensitive functions.

Overall, the plugin presents a very low security risk. Its strengths lie in its robust input/output handling, secure data querying, and limited external interactions. The main area for vigilance, as with any plugin, would be ongoing maintenance and prompt patching if any future vulnerabilities were to be discovered, though its history suggests this is unlikely.

Vulnerabilities
None known

Post Order Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Order Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
17 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped17 total outputs
Attack Surface

Post Order Manager Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_pomgr_save_orderadmin\class-post-order-admin.php:12
WordPress Hooks 4
actionadmin_menuadmin\class-post-order-admin.php:9
actionadmin_initadmin\class-post-order-admin.php:10
actionadmin_enqueue_scriptsadmin\class-post-order-admin.php:11
actionplugins_loadedpost-order-manager.php:22
Maintenance & Trust

Post Order Manager Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 11, 2025
PHP min version7.2
Downloads341

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Post Order Manager Developer Profile

Hardik Kumar

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Order Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-order-manager/assets/css/admin.css/wp-content/plugins/post-order-manager/assets/js/pomgr-sort.js
Script Paths
/wp-content/plugins/post-order-manager/assets/js/pomgr-sort.js
Version Parameters
post-order-manager/assets/css/admin.css?ver=1.0.1post-order-manager/assets/js/pomgr-sort.js?ver=1.0.1

HTML / DOM Fingerprints

CSS Classes
pomgr-loaderpomgr-sortabledashicons-movehandlepomgr-order-numpomgr-post-id
Data Attributes
pomgr_select_noncepomgr_select_type
JS Globals
pomgr_ajax
FAQ

Frequently Asked Questions about Post Order Manager