RSS Related Posts Security & Risk Analysis

wordpress.org/plugins/rss-related-posts

This plugin shows a list of 10 related post, called by rss from Google blogsearch.

10 active installs v2.0 PHP + WP 2.0.2+ Updated Unknown
feedrelated-postsrsssimplepie
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RSS Related Posts Safe to Use in 2026?

Generally Safe

Score 100/100

RSS Related Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of the "rss-related-posts" plugin v2.0 reveals a plugin with a remarkably small attack surface, as indicated by the absence of AJAX handlers, REST API routes, shortcodes, and cron events that are exposed or unprotected. The code signals also show good practices regarding database interactions, with all SQL queries utilizing prepared statements, and no file operations or external HTTP requests being performed. This suggests a generally well-contained and defensively coded plugin in these specific areas. However, a significant concern arises from the complete lack of output escaping for all identified output points. This means that any data displayed by the plugin could potentially be injected with malicious code, leading to cross-site scripting (XSS) vulnerabilities if user-supplied or dynamic data is not properly sanitized before rendering.

The plugin's vulnerability history is clean, with no known CVEs recorded. This is a positive indicator and, combined with the minimal attack surface, suggests that if vulnerabilities exist, they are either very obscure or have been diligently addressed in the past. The absence of any recorded vulnerabilities across all severity levels also implies that the developers may have a strong focus on security or that the plugin's functionality is inherently less prone to complex security flaws.

In conclusion, the "rss-related-posts" plugin v2.0 exhibits strengths in its limited attack surface and secure database practices. However, the critical weakness of unescaped output represents a tangible and potentially severe risk that needs immediate attention. While the lack of a vulnerability history is encouraging, it does not negate the immediate threat posed by the unescaped output. The absence of taint analysis results is not necessarily a strength but rather an indication that either no flows were detected or the analysis tool was limited.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

RSS Related Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RSS Related Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

RSS Related Posts Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

RSS Related Posts Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

RSS Related Posts Developer Profile

Cristescu Bogdan

2 plugins · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RSS Related Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
rsscontentrssheader
Shortcode Output
<div class="rsscontent"><h2 class="rssheader"></h2><p><a href="" title="
FAQ

Frequently Asked Questions about RSS Related Posts