Private by Default Security & Risk Analysis

wordpress.org/plugins/private-by-default

When creating new posts or pages (of regular WordPress types or custom post types), this plugin makes them private by default.

60 active installs v1.0 PHP + WP 3.0+ Updated Sep 7, 2015
customdefaultpagepostprivate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Private by Default Safe to Use in 2026?

Generally Safe

Score 85/100

Private by Default has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "private-by-default" v1.0 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code signals indicate a lack of dangerous functions and the exclusive use of prepared statements for any SQL queries, which are positive indicators. The lack of file operations and external HTTP requests further bolsters its security. However, a critical concern is the complete lack of output escaping, meaning all 3 identified outputs are vulnerable to cross-site scripting (XSS) attacks. The absence of nonce checks and capability checks on potential entry points (though there are none currently) would be a significant risk if new entry points were added without proper security measures. The plugin's vulnerability history is clean, with no recorded CVEs, suggesting a good track record. While the lack of output escaping is a serious flaw, the overall limited attack surface and absence of other common vulnerabilities present a mixed picture. The plugin is strong in its foundational security but has a critical oversight in output sanitization.

Key Concerns

  • All identified outputs are unescaped
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Private by Default Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Private by Default Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Private by Default Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionpost_submitbox_misc_actionsprivate-by-default.php:44
Maintenance & Trust

Private by Default Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 7, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings4
Active installs60
Developer Profile

Private by Default Developer Profile

anttti

1 plugin · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Private by Default

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
visibility-radio-privatevisibility-radio-passwordvisibility-radio-public
Shortcode Output
<script type='text/javascript'> (function($) { try { $('#post-visibility-display').text(''); $('#hidden-post-visibility').val(''); $('#visibility-radio-').attr('checked', true); } catch(e) {} })(jQuery); </script>
FAQ

Frequently Asked Questions about Private by Default