
Require & Limit Categories, Tags, Featured Image and taxonomies Security & Risk Analysis
wordpress.org/plugins/require-taxonomy-image-category-tag[ โ ๐๐๐๐๐๐ ๐๐๐๐๐๐๐ b๐ ๐ซ๐๐๐๐] Force dashboard users to select chosen fields during publishing
Is Require & Limit Categories, Tags, Featured Image and taxonomies Safe to Use in 2026?
Generally Safe
Score 92/100Require & Limit Categories, Tags, Featured Image and taxonomies has a strong security track record. Known vulnerabilities have been patched promptly.
The "require-taxonomy-image-category-tag" plugin, version 1.30, presents a mixed security posture. On the positive side, it demonstrates a robust effort in securing its entry points, with zero identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. The use of prepared statements for 77% of SQL queries and the presence of nonce and capability checks are also good security practices.
However, significant concerns arise from the static analysis. The presence of the `unserialize` function is a critical red flag, as it can lead to Remote Code Execution if not handled with extreme caution and validation of input. Furthermore, a high-severity taint flow with unsanitized paths indicates a potential pathway for attackers to manipulate file operations or other sensitive actions. The fact that 6 out of 8 analyzed flows have unsanitized paths is particularly worrying, suggesting a broad exposure to input validation weaknesses.
The plugin's vulnerability history, while currently showing no unpatched CVEs, reveals a past medium-severity Cross-Site Scripting (XSS) vulnerability discovered in August 2022. This history, combined with the current taint analysis findings, suggests a pattern of potential input sanitization issues that could resurface or lead to new vulnerabilities. While the limited attack surface is a strength, the identified critical code patterns and past XSS incident warrant a cautious approach to its usage.
Key Concerns
- Presence of dangerous function: unserialize
- High severity taint flow found
- Large number of unsanitized paths in taint flows
- Low percentage of properly escaped output
- Past medium severity CVE for XSS
Require & Limit Categories, Tags, Featured Image and taxonomies Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Require & Limit Categories, Tags, Featured Image and taxonomies <= 1.26 - Reflected Cross-Site Scripting
Require & Limit Categories, Tags, Featured Image and taxonomies Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Require & Limit Categories, Tags, Featured Image and taxonomies Attack Surface
WordPress Hooks 34
Maintenance & Trust
Require & Limit Categories, Tags, Featured Image and taxonomies Maintenance & Trust
Maintenance Signals
Community Trust
Require & Limit Categories, Tags, Featured Image and taxonomies Alternatives
Require Post Category
require-post-category
Require users to choose a post category before updating or publishing a post.
Archive Title
archive-title
Provides options to control an archive page title.
Tag Selector
tag-selector
Tag Selector allows you to select tags for your post/page much the same way you select categories.
Kntnt's Any Term for Beaver Builder Page Builder
kntnts-bb-any-term
WordPress plugin that adds special purpose term to every taxonomy (including categories and tags) that makes taxonomy filters in post modules of Beave …
Post Category Advanced
post-category-advanced
Create relationships between post categories and tags, and more.
Require & Limit Categories, Tags, Featured Image and taxonomies Developer Profile
16 plugins ยท 51K total installs
How We Detect Require & Limit Categories, Tags, Featured Image and taxonomies
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/require-taxonomy-image-category-tag/assets/scripts-admin.js/wp-content/plugins/require-taxonomy-image-category-tag/assets/scripts-admin.jsrequire-taxonomy-image-category-tag/assets/scripts-admin.js?ver=HTML / DOM Fingerprints
rtict_object