Post Password Token Security & Risk Analysis

wordpress.org/plugins/post-password-plugin

The Post Password Token plugin allows readers to access protected posts without having to enter a password by creating secret token urls for the post.

600 active installs v2.0.3 PHP 7.4+ WP 5.7+ Updated Jul 6, 2023
guestpasspasswordposttoken
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Password Token Safe to Use in 2026?

Generally Safe

Score 85/100

Post Password Token has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "post-password-plugin" v2.0.3 exhibits a strong security posture from a static analysis perspective, with no identified direct attack vectors like unprotected AJAX handlers, REST API routes, shortcodes, or cron events. The absence of dangerous functions and file operations further contributes to this positive assessment. Furthermore, all SQL queries are properly prepared, and the plugin does not make external HTTP requests or bundle external libraries, reducing the potential for common vulnerabilities. The lack of any recorded CVEs in its history, with no unpatched or past vulnerabilities, strongly suggests a commitment to security maintenance or a very limited feature set that avoids common pitfalls. However, the analysis does highlight a significant concern: 100% of the 10 identified output operations are not properly escaped. This absence of output escaping represents a considerable risk, as it leaves the plugin vulnerable to Cross-Site Scripting (XSS) attacks if any user-supplied data is ever rendered directly in the output. While the attack surface appears minimal, this unescaped output is a critical weakness that needs immediate attention to prevent potential compromises.

Key Concerns

  • 100% of outputs are not properly escaped
Vulnerabilities
None known

Post Password Token Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Password Token Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Attack Surface

Post Password Token Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedpost-password-token.php:32
actionplugins_loadedpost-password-token.php:33
Maintenance & Trust

Post Password Token Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedJul 6, 2023
PHP min version7.4
Downloads18K

Community Trust

Rating98/100
Number of ratings7
Active installs600
Developer Profile

Post Password Token Developer Profile

Shawn Parker

2 plugins · 700 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Password Token

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-password-plugin/assets/css/client.css/wp-content/plugins/post-password-plugin/assets/css/admin.css/wp-content/plugins/post-password-plugin/assets/js/client.js/wp-content/plugins/post-password-plugin/assets/js/admin.js
Script Paths
/wp-content/plugins/post-password-plugin/assets/js/client.js/wp-content/plugins/post-password-plugin/assets/js/admin.js
Version Parameters
post-password-plugin/assets/css/client.css?ver=post-password-plugin/assets/css/admin.css?ver=post-password-plugin/assets/js/client.js?ver=post-password-plugin/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
ppt-wrapppt-hrppt-form-boxppt-roundedppt-insetppt-post-type-optionsppt-danger-boxadvanced-option-input+4 more
HTML Comments
Requires/Assumes being loaded via PPTAdminCopyright (c) 2009-2022 Shawn Parker, Gordon Brander. All rights reserved.Warning: changing the salt will modify all <em>Password Token URLs</em> site-wide: readers will no longer be able to use old <em>Password Token URLs</em> to view protected content.Cryptography is a complex subject, so the short of it is "newer is better". However, <b>upgrading the hashing algorithm will obsolete your old urls</b>, so if you need to maintain backwards compatability, then you should leave this alone.
Data Attributes
data-slugdata-postid
JS Globals
PPTAdminPPTClient
FAQ

Frequently Asked Questions about Post Password Token