Reveal Post Data Security & Risk Analysis

wordpress.org/plugins/reveal-post-data

Adds a button in the editor sidebar to show the raw post data.

0 active installs v0.1.3 PHP 7.0+ WP 6.4+ Updated Apr 11, 2025
block
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Reveal Post Data Safe to Use in 2026?

Generally Safe

Score 100/100

Reveal Post Data has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "reveal-post-data" plugin v0.1.3 exhibits a generally good security posture with several strengths. It demonstrates a strong commitment to secure coding practices by exclusively using prepared statements for SQL queries and properly escaping all output, which significantly mitigates common risks like SQL injection and cross-site scripting (XSS). The absence of dangerous functions, file operations, and external HTTP requests further contributes to its safety. Furthermore, the lack of recorded vulnerabilities in its history suggests a well-maintained and secure development lifecycle.

However, a notable concern arises from the static analysis, specifically the presence of one unprotected REST API route. This represents a direct entry point into the plugin that lacks authentication or permission checks. While the code signals indicate only one capability check in total, the fact that this REST API route does not have a corresponding permission check is a significant oversight. This unprotected endpoint could potentially be exploited to reveal sensitive post data to unauthenticated users, depending on what functionality the REST API endpoint exposes. The absence of taint analysis results does not necessarily mean there are no taint flows, but rather that the analysis performed did not detect any based on the provided signals.

Key Concerns

  • Unprotected REST API route
Vulnerabilities
None known

Reveal Post Data Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Reveal Post Data Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
1 unprotected

Reveal Post Data Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/reveal-post-data/v1/post/(?P<id>\d+)reveal-post-data.php:50
WordPress Hooks 2
actionenqueue_block_editor_assetsreveal-post-data.php:43
actionrest_api_initreveal-post-data.php:70
Maintenance & Trust

Reveal Post Data Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 11, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Reveal Post Data Developer Profile

Code Amp

4 plugins · 84K total installs

77
trust score
Avg Security Score
97/100
Avg Patch Time
594 days
View full developer profile
Detection Fingerprints

How We Detect Reveal Post Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/reveal-post-data/build/index.js/wp-content/plugins/reveal-post-data/build/style-index.css
Script Paths
/wp-content/plugins/reveal-post-data/build/index.js
Version Parameters
reveal-post-data/build/index.js?ver=reveal-post-data/build/style-index.css?ver=

HTML / DOM Fingerprints

REST Endpoints
/wp-json/reveal-post-data/v1/post/
FAQ

Frequently Asked Questions about Reveal Post Data