
Post Requirements Security & Risk Analysis
wordpress.org/plugins/post-requirementsThis plugin allows you to require posts to have thumbnail set and/or tags.
Is Post Requirements Safe to Use in 2026?
Generally Safe
Score 85/100Post Requirements has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The post-requirements plugin v1.1.2 exhibits a mixed security posture. On the positive side, it demonstrates strong practices regarding SQL query sanitization, exclusively utilizing prepared statements. Furthermore, the absence of known CVEs and its minimal attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, suggest a potentially robust build against common external attack vectors. The plugin also avoids making external HTTP requests and doesn't bundle external libraries, which generally reduces risk.
However, significant concerns arise from the static analysis. The presence of the `create_function` dangerous function is a notable red flag, as it can be exploited for code injection if user-supplied data influences its parameters. Crucially, 100% of output escaping is missing across all identified outputs, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis revealing two flows with unsanitized paths, even without critical or high severity ratings, warrants further investigation as these could be indicators of potential information disclosure or manipulation risks. The lack of nonce and capability checks across all identified entry points (though there are none) is less of an immediate concern given the zero attack surface, but it indicates a lack of defensive programming practices that could become problematic if the attack surface were to expand in future versions or through other plugin interactions.
In conclusion, while the plugin benefits from a small attack surface and secure SQL handling, the critical omissions in output escaping and the use of a dangerous function pose substantial risks. The absence of past vulnerabilities is encouraging but does not negate the immediate coding flaws identified. Users should proceed with caution and consider the potential for XSS and code injection until these issues are addressed.
Key Concerns
- 100% of output is unescaped
- Dangerous function detected (create_function)
- Taint analysis: 2 flows with unsanitized paths
- No nonce checks
- No capability checks
Post Requirements Security Vulnerabilities
Post Requirements Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Post Requirements Attack Surface
WordPress Hooks 6
Maintenance & Trust
Post Requirements Maintenance & Trust
Maintenance Signals
Community Trust
Post Requirements Alternatives
Require Post Tags
require-post-tags
Require users to add at least one post tag before saving a draft, updating a post, or publishing a post. This applies to normal posts and may not be …
Force Regenerate Thumbnails
force-regenerate-thumbnails
Delete and REALLY force thumbnail regeneration.
reGenerate Thumbnails Advanced
regenerate-thumbnails-advanced
Regenerate thumbnails quickly and easily, including forced regeneration; very useful when changing a theme or adding new thumbnail sizes.
Real Thumbnail Generator: Efficient regeneration of thumbnails in all sizes
real-thumbnail-generator-lite
Real Thumbnail Generator is a WordPress plugin for regenerating thumbnails. It is beginner-friendly, SEO-optimised and GDPR-compliant.
Require Post Category
require-post-category
Require users to choose a post category before updating or publishing a post.
Post Requirements Developer Profile
1 plugin · 10 total installs
How We Detect Post Requirements
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wrap<!-- do_settings_fields('postreq', 'postreq-main'); -->name="require-thumbnail"id="require-thumbnail"name="require-tags"id="require-tags"