Post Version Control Security & Risk Analysis

wordpress.org/plugins/post-version-control

Automatic version control for posts with the same prefix in the post_name

10 active installs v1.0 PHP + WP 2.5+ Updated May 29, 2008
automaticrevisionsubversionsvnversion-control
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Version Control Safe to Use in 2026?

Generally Safe

Score 85/100

Post Version Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "post-version-control" v1.0 plugin, based on the static analysis, exhibits a concerning lack of security best practices. While the attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events, the code itself reveals significant vulnerabilities. Notably, 100% of its SQL queries are not using prepared statements, exposing the plugin to potential SQL injection attacks. Furthermore, 100% of the identified output operations are not properly escaped, leaving it vulnerable to cross-site scripting (XSS) attacks. The presence of file operations without any documented security checks or capability checks on entry points is also a red flag. The vulnerability history shows no prior issues, which is positive, but this could also indicate that the plugin has not been extensively tested or that previous versions did not employ these risky coding practices. The overall security posture is poor due to the presence of critical vulnerabilities in how data is handled internally, despite a seemingly small external attack surface. The lack of nonces, capability checks, and proper output escaping in conjunction with unescaped SQL queries presents a substantial risk to any WordPress site using this plugin.

Key Concerns

  • Raw SQL queries without prepared statements
  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Post Version Control Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Version Control Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

Post Version Control Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menupost-version-control.php:34
filterthe_contentpost-version-control.php:37
filtercontent_edit_prepost-version-control.php:38
actioninitpost-version-control.php:40
actionsave_postpost-version-control.php:41
Maintenance & Trust

Post Version Control Maintenance & Trust

Maintenance Signals

WordPress version tested2.5.1
Last updatedMay 29, 2008
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Version Control Developer Profile

Makis

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Version Control

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- outdated: (\w+) -->
FAQ

Frequently Asked Questions about Post Version Control