PostRank Security & Risk Analysis

wordpress.org/plugins/postrank

The ranking of your posts. Visit [Plugin Page](http://jeeker.net/projects/postrank/ "PostRank") for usage information and project news.

10 active installs v0.1.3 PHP + WP 2.7+ Updated Nov 15, 2012
counterpostpostviewsrankviews
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PostRank Safe to Use in 2026?

Generally Safe

Score 85/100

PostRank has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'postrank' plugin version 0.1.3 exhibits a generally positive security posture based on the provided static analysis. The absence of dangerous functions, SQL queries exclusively using prepared statements, and no file operations or external HTTP requests are strong indicators of secure coding practices. Furthermore, the lack of any recorded vulnerabilities or CVEs in its history suggests a history of responsible development and maintenance. The plugin also has a minimal attack surface with no exposed AJAX handlers, REST API routes, or shortcodes, and all identified entry points appear to be protected.

However, there are notable areas for concern. The low percentage of properly escaped output (32%) is a significant weakness, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks across all entry points, even for the single cron event, is a critical oversight. This means that malicious actors could potentially trigger the cron event or exploit other functionalities without proper authorization or verification.

In conclusion, while the plugin demonstrates strengths in preventing common server-side vulnerabilities like SQL injection and external exploits, the poor output escaping and lack of authorization checks represent substantial risks. Addressing these specific weaknesses would significantly improve the plugin's overall security. The low attack surface is a positive attribute, but it doesn't mitigate the risks posed by the identified implementation flaws.

Key Concerns

  • Low output escaping percentage
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

PostRank Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

PostRank Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

PostRank Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
13 prepared
Unescaped Output
21
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared13 total queries

Output Escaping

32% escaped31 total outputs
Attack Surface

PostRank Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionwp_footerpostrank.php:99
actionshutdownpostrank.php:100
actionadmin_menupostrank.php:101
actionwp_update_comment_countpostrank.php:102
actiondelete_pagepostrank.php:103
actiondelete_postpostrank.php:104
filtercron_schedulespostrank.php:105
actionpostrank_weekly_restat_schedulepostrank.php:106
actionplugins_loadedpostrank.php:1028

Scheduled Events 1

postrank_weekly_restat_schedule
Maintenance & Trust

PostRank Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 15, 2012
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PostRank Developer Profile

JinnLynn

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PostRank

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PostRank