Post View Count Editor Security & Risk Analysis

wordpress.org/plugins/post-view-count-editor

With Post View Count Editor you can edit the views of any of your post type, easily in your backend only if you admin

10 active installs v1.3 PHP 6.0+ WP 4.7+ Updated Sep 16, 2020
counter-editoreventspostpost-countviews
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post View Count Editor Safe to Use in 2026?

Generally Safe

Score 85/100

Post View Count Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'post-view-count-editor' plugin v1.3 appears to have a generally good security posture. The absence of known CVEs, dangerous functions, file operations, and external HTTP requests is positive. Furthermore, the strict use of prepared statements for all SQL queries mitigates the risk of SQL injection vulnerabilities. The plugin also has a very small attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential entry points for attackers.

However, there are a couple of areas for concern. The static analysis indicates that only 50% of the output is properly escaped, which leaves a potential for Cross-Site Scripting (XSS) vulnerabilities if the unescaped output is user-controllable. Additionally, the complete absence of nonce checks and capability checks across all entry points (though the entry points themselves are zero) is a significant weakness. If any functionality were to be added in the future, or if the static analysis missed an entry point, the lack of these fundamental security measures would be a critical oversight.

Overall, the plugin demonstrates good practices in handling database interactions and limiting its attack surface. The vulnerability history being clear of any issues is a strong indicator of a well-maintained codebase. However, the unescaped output and the complete lack of security checks on any potential entry points, even if currently zero, represent a potential risk that should be addressed to ensure robust security moving forward.

Key Concerns

  • Partial output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Post View Count Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post View Count Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Post View Count Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadd_meta_boxesindex.php:38
actionadmin_initindex.php:42
actionsave_postindex.php:86
Maintenance & Trust

Post View Count Editor Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedSep 16, 2020
PHP min version6.0
Downloads987

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post View Count Editor Developer Profile

rainafarai

5 plugins · 4K total installs

92
trust score
Avg Security Score
88/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Post View Count Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post View Count Editor