Publish View Security & Risk Analysis

wordpress.org/plugins/publish-view

Adds a button so you can save Publish or save Draft and view in one step.

500 active installs v2.3.2 PHP + WP 3.6.1+ Updated Apr 27, 2017
draftpublishsaveupdateview
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Publish View Safe to Use in 2026?

Generally Safe

Score 85/100

Publish View has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "publish-view" v2.3.2 plugin exhibits a strong static security posture with no identified entry points into the application that are not protected by authentication. The absence of AJAX handlers, REST API routes, shortcodes, and cron events without proper checks is a significant strength. Furthermore, the code relies entirely on prepared statements for SQL queries, mitigating the risk of SQL injection vulnerabilities. There are also no identified dangerous functions, file operations, or external HTTP requests that could be exploited.

However, a critical concern arises from the output escaping results. With 100% of the identified outputs not being properly escaped, this plugin presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by this plugin could be maliciously injected with scripts, compromising user sessions or defacing the website. The lack of documented past vulnerabilities is positive, suggesting the developers may have a good understanding of security, but it does not negate the current risk posed by unescaped output. While the plugin has a small attack surface and uses secure database practices, the lack of output escaping is a severe oversight that needs immediate attention.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

Publish View Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Publish View Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Publish View Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionshow_user_profilepublish-view.php:33
actionedit_user_profilepublish-view.php:34
actionpersonal_options_updatepublish-view.php:36
actionedit_user_profile_updatepublish-view.php:37
actionadmin_enqueue_scriptspublish-view.php:39
actionpost_submitbox_startpublish-view.php:40
filterredirect_post_locationpublish-view.php:41
Maintenance & Trust

Publish View Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 27, 2017
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings3
Active installs500
Developer Profile

Publish View Developer Profile

launchinteractive

4 plugins · 5K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
737 days
View full developer profile
Detection Fingerprints

How We Detect Publish View

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/publish-view/publish-view-dashicons.css/wp-content/plugins/publish-view/publish-view.css

HTML / DOM Fingerprints

CSS Classes
pv_wrap
Data Attributes
name="pv_new_window"name="pv_publish_new_window"id="pv_view_hidden"name="pv_view"id="pv_publish"id="pv_draft"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Publish View