Restricted Tags Security & Risk Analysis

wordpress.org/plugins/restrict-tags

Using this plugin, Administrators can define tags, which are then the only tags visible for Authors, Editors & Contributors when editing a blog po …

20 active installs v1.0 PHP + WP 3.0+ Updated Apr 29, 2011
custom-taxonomiestags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Restricted Tags Safe to Use in 2026?

Generally Safe

Score 85/100

Restricted Tags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "restrict-tags" v1.0 plugin exhibits a generally good security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, and importantly, there are no unprotected entry points. The code also demonstrates a commitment to secure SQL practices by using prepared statements exclusively, and there are no file operations or external HTTP requests, further reducing potential vulnerabilities.

However, a critical concern arises from the output escaping. With 5 total outputs and 0% properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is not adequately sanitized before being displayed to users could be exploited to inject malicious scripts. The lack of nonce checks, while not directly leading to a deduction given the limited entry points, is a weakness that could become problematic if new entry points are added without proper security considerations. The plugin's vulnerability history is clean, with no known CVEs, which is a positive sign, but it doesn't negate the risks identified in the code analysis.

In conclusion, while the plugin's limited attack surface and secure database practices are commendable, the widespread lack of output escaping represents a significant security flaw that requires immediate attention. The absence of historical vulnerabilities is reassuring, but the identified code-level risk of XSS necessitates caution. Addressing the output escaping issue is paramount to improving the plugin's overall security.

Key Concerns

  • Unescaped output detected
  • No nonce checks on potential entry points
Vulnerabilities
None known

Restricted Tags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Restricted Tags Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Restricted Tags Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menurestrict-tags.php:33
actioninitrestrict-tags.php:82
Maintenance & Trust

Restricted Tags Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedApr 29, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Restricted Tags Developer Profile

thenbrent

5 plugins · 440 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Restricted Tags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
categorydivtabs-panellist:categorycategorychecklistform-no-clear
Data Attributes
taxonomy-<?php echo $taxonomy; ?><?php echo $taxonomy; ?>-all<?php echo $taxonomy; ?>checklistlist:<?php echo $taxonomy?>
FAQ

Frequently Asked Questions about Restricted Tags