Post Requirements Security & Risk Analysis

wordpress.org/plugins/post-requirements

This plugin allows you to require posts to have thumbnail set and/or tags.

10 active installs v1.1.2 PHP + WP 3.4.0+ Updated Aug 3, 2016
forcerequiretagsthumbnail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Requirements Safe to Use in 2026?

Generally Safe

Score 85/100

Post Requirements has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The post-requirements plugin v1.1.2 exhibits a mixed security posture. On the positive side, it demonstrates strong practices regarding SQL query sanitization, exclusively utilizing prepared statements. Furthermore, the absence of known CVEs and its minimal attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, suggest a potentially robust build against common external attack vectors. The plugin also avoids making external HTTP requests and doesn't bundle external libraries, which generally reduces risk.

However, significant concerns arise from the static analysis. The presence of the `create_function` dangerous function is a notable red flag, as it can be exploited for code injection if user-supplied data influences its parameters. Crucially, 100% of output escaping is missing across all identified outputs, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis revealing two flows with unsanitized paths, even without critical or high severity ratings, warrants further investigation as these could be indicators of potential information disclosure or manipulation risks. The lack of nonce and capability checks across all identified entry points (though there are none) is less of an immediate concern given the zero attack surface, but it indicates a lack of defensive programming practices that could become problematic if the attack surface were to expand in future versions or through other plugin interactions.

In conclusion, while the plugin benefits from a small attack surface and secure SQL handling, the critical omissions in output escaping and the use of a dangerous function pose substantial risks. The absence of past vulnerabilities is encouraging but does not negate the immediate coding flaws identified. Users should proceed with caution and consider the potential for XSS and code injection until these issues are addressed.

Key Concerns

  • 100% of output is unescaped
  • Dangerous function detected (create_function)
  • Taint analysis: 2 flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Post Requirements Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Requirements Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$cb = create_function('', '');postreq.php:74

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
postreq_custom_message_print (postreq.php:155)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Requirements Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menupostreq.php:20
actionadmin_initpostreq.php:26
filterredirect_post_locationpostreq.php:106
filterredirect_post_locationpostreq.php:120
filterwp_insert_post_datapostreq.php:129
actionadmin_noticespostreq.php:160
Maintenance & Trust

Post Requirements Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 3, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Post Requirements Developer Profile

carestad

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Requirements

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
HTML Comments
<!-- do_settings_fields('postreq', 'postreq-main'); -->
Data Attributes
name="require-thumbnail"id="require-thumbnail"name="require-tags"id="require-tags"
FAQ

Frequently Asked Questions about Post Requirements