Punchlist Security & Risk Analysis

wordpress.org/plugins/punchlist

This plugin will allow you to share your posts and pages (including drafts!) for collaboration on Punchlist.

0 active installs v1.5.2 PHP 7.4+ WP 5.5+ Updated May 3, 2024
annotationcollaborationfeedbackpunchlisttools
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Punchlist Safe to Use in 2026?

Generally Safe

Score 85/100

Punchlist has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "punchlist" plugin v1.5.2 demonstrates a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and the fact that all analyzed flows are either not present or sanitized are positive indicators. Furthermore, the plugin correctly utilizes prepared statements for all SQL queries, which is a critical security best practice. All output is properly escaped, and nonce checks are implemented on all identified AJAX handlers, mitigating common cross-site scripting and request forgery vulnerabilities.

However, a notable area for improvement is the complete lack of capability checks on the four AJAX handlers. While nonce checks are present, they protect against forged requests, but not necessarily against authenticated users performing actions they shouldn't have access to. Relying solely on nonces for AJAX endpoints, without corresponding capability checks, leaves the plugin vulnerable to privilege escalation if an attacker can trick an authenticated user with lower privileges into triggering an AJAX action intended for administrators or other privileged roles. The presence of file operations and external HTTP requests, while not inherently insecure without further context, warrants careful review to ensure these functionalities do not introduce unexpected vulnerabilities.

In conclusion, "punchlist" v1.5.2 has a solid foundation with robust handling of SQL, output escaping, and nonce protection. The main weakness lies in the missing capability checks for its AJAX endpoints. The lack of any historical vulnerabilities is a strong positive, suggesting good development practices over time, but it does not negate the immediate risks identified in the static analysis. Addressing the missing capability checks should be the priority to enhance its overall security.

Key Concerns

  • Missing capability checks on AJAX handlers
Vulnerabilities
None known

Punchlist Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Punchlist Release Timeline

v1.5.2Current
v1.5.1
v1.5.0
v1.4.5
v1.4.4
v1.4.3
v1.3.9
v1.3.8
v1.3.7
v1.3.6
v1.3.5
v1.3.4
v1.3.3
v1.3.1
v1.3.0
v1.2.8
Code Analysis
Analyzed Mar 17, 2026

Punchlist Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
4
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

100% escaped9 total outputs
Attack Surface

Punchlist Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_pl_check_integrationbootstrap.php:54
authwp_ajax_pl_get_projectsbootstrap.php:55
authwp_ajax_pl_create_project_edit_screenbootstrap.php:56
authwp_ajax_pl_add_to_project_edit_screenbootstrap.php:57
WordPress Hooks 11
actionpre_get_postsbootstrap.php:49
actionwp_enqueue_scriptsbootstrap.php:50
actionadmin_enqueue_scriptsbootstrap.php:52
actionadmin_menubootstrap.php:53
actionadd_meta_boxesbootstrap.php:58
filterquery_varssrc\Preview.php:14
filterwpseo_whitelist_permalink_varssrc\Preview.php:16
filtercomments_opensrc\Preview.php:60
filterpings_opensrc\Preview.php:61
filterwp_link_pages_linksrc\Preview.php:62
filterposts_resultssrc\Preview.php:72
Maintenance & Trust

Punchlist Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 3, 2024
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Punchlist Developer Profile

Nic Rosental

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Punchlist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/punchlist/css/styles.css
Script Paths
/wp-content/plugins/punchlist/js/plAdminScript.js/wp-content/plugins/punchlist/js/plCreateProject.js
Version Parameters
punchlist/css/styles.css?ver=1.0.0punchlist/js/plAdminScript.jspunchlist/js/plCreateProject.js

HTML / DOM Fingerprints

JS Globals
window.Punchlist
REST Endpoints
/wp-json/punchlist
FAQ

Frequently Asked Questions about Punchlist