Posts Order Widget Security & Risk Analysis

wordpress.org/plugins/posts-order-widget

Add the ability to sort the posts by context rather than descending date.

40 active installs v2.0.3 PHP + WP 3.6.1+ Updated Dec 12, 2013
default-orderorderpostssortsorting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Posts Order Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Posts Order Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "posts-order-widget" plugin v2.0.3 exhibits a generally strong security posture based on the provided static analysis. The plugin has no recorded vulnerabilities (CVEs) and no critical or high-severity issues detected in taint analysis. The absence of dangerous functions, file operations, and external HTTP requests is also a positive sign. Furthermore, all SQL queries utilize prepared statements, which is an excellent practice for preventing SQL injection vulnerabilities.

However, there are significant concerns regarding output escaping. With 26 total outputs, only 8% are properly escaped, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. This is a critical weakness that can be exploited to inject malicious scripts into the website, impacting users. The lack of nonce checks and capability checks on the identified entry points (even though there are zero in total) is a missed opportunity for further hardening, although less critical given the current absence of exposed entry points.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL queries and dangerous functions, the severe deficiency in output escaping presents a substantial risk. This needs to be addressed immediately to prevent potential XSS attacks. The absence of identified entry points and taint flows is positive but does not negate the immediate threat posed by improper output sanitization.

Key Concerns

  • Poor output escaping (21 out of 26 outputs unescaped)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Posts Order Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Posts Order Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

8% escaped26 total outputs
Attack Surface

Posts Order Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterpre_get_postspost-order-widget.php:26
actionwidgets_initpost-order-widget.php:32
actionedit_termtaxonomy.class.php:25
Maintenance & Trust

Posts Order Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedDec 12, 2013
PHP min version
Downloads5K

Community Trust

Rating80/100
Number of ratings4
Active installs40
Developer Profile

Posts Order Widget Developer Profile

LordPretender

8 plugins · 310 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Posts Order Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
pow_widget
FAQ

Frequently Asked Questions about Posts Order Widget