Post Revision Workflow Security & Risk Analysis

wordpress.org/plugins/post-revision-workflow

Allows anyone editing a published page or post to draft changes before those modifications go public.

10 active installs v0.2a PHP + WP 3.0+ Updated Unknown
editorreviewrevisionworkflow
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Revision Workflow Safe to Use in 2026?

Generally Safe

Score 100/100

Post Revision Workflow has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The post-revision-workflow plugin version 0.2a exhibits a generally positive security posture due to the absence of known vulnerabilities and a lack of critical code signals like dangerous functions or external HTTP requests. The static analysis also indicates a very limited attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. Furthermore, all SQL queries are correctly implemented using prepared statements, which is a strong security practice. However, a significant concern arises from the output escaping. With 100% of the 23 output operations improperly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Attackers could potentially inject malicious scripts into the WordPress dashboard or the front-end of the site through this plugin. While the plugin has no recorded vulnerability history, the lack of proper output escaping presents a clear and present danger that could lead to future security incidents. The plugin needs immediate attention to address the output escaping issues to mitigate XSS risks.

Key Concerns

  • All output operations are unescaped
Vulnerabilities
None known

Post Revision Workflow Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Revision Workflow Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
23
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped23 total outputs
Attack Surface

Post Revision Workflow Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionpost_submitbox_misc_actionsclass-post-revision-workflow.php:17
actiondo_meta_boxesclass-post-revision-workflow.php:18
actionsave_postclass-post-revision-workflow.php:19
actionplugins_loadedclass-post-revision-workflow.php:20
actionadmin_initclass-post-revision-workflow.php:21
actionafter_setup_themeclass-post-revision-workflow.php:22
actioninitclass-post-revision-workflow.php:23
actionwpmu_optionsclass-post-revision-workflow.php:64
actionupdate_wpmu_optionsclass-post-revision-workflow.php:65
actionplugins_loadedpost-revision-workflow.php:36
Maintenance & Trust

Post Revision Workflow Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Revision Workflow Developer Profile

Curtiss Grymala

8 plugins · 2K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Revision Workflow

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post Revision Workflow