Select All Posts Security & Risk Analysis

wordpress.org/plugins/select-all-posts

Adds a checkbox to wordpress tables to allow bulk actions on ALL items in the table.

20 active installs v1.0.0 PHP + WP 4.7+ Updated Sep 15, 2020
bulkpagespostsproductswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Select All Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Select All Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'select-all-posts' plugin v1.0.0 exhibits a seemingly strong security posture based on the provided static analysis. The absence of any identified dangerous functions, direct SQL queries, file operations, or external HTTP requests is a positive indicator. Furthermore, the analysis suggests proper output escaping and a clean taint analysis with no unsanitized paths, which are all good development practices. The plugin also has no recorded vulnerability history, further reinforcing the impression of a secure codebase.

However, the complete lack of any entry points (AJAX handlers, REST API routes, shortcodes, cron events) is unusual. This suggests the plugin may not be actively performing any user-facing or background operations that would require security checks. The absence of nonce and capability checks across all analyzed areas is a direct consequence of this lack of entry points. While not an immediate vulnerability, it means that if any new entry points were to be added in future versions without proper security measures, the plugin would be immediately exposed.

In conclusion, the current version of 'select-all-posts' appears to be very secure due to its minimal functionality and lack of exploitable code paths. The main weakness is the potential for future vulnerabilities if new features are introduced without corresponding security controls, given the current absence of any authorization or input validation mechanisms.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Select All Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Select All Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Select All Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filteredit_posts_per_pageadmin\class-select-all-posts-admin.php:74
actionplugins_loadedincludes\class-select-all-posts.php:142
actioncurrent_screenincludes\class-select-all-posts.php:156
actioncurrent_screenincludes\class-select-all-posts.php:159
actionwp_enqueue_scriptsincludes\class-select-all-posts.php:175
actionwp_enqueue_scriptsincludes\class-select-all-posts.php:176
Maintenance & Trust

Select All Posts Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedSep 15, 2020
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Select All Posts Developer Profile

inonkp

2 plugins · 110 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Select All Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/select-all-posts/css/select-all-posts-admin.css/wp-content/plugins/select-all-posts/js/select-all-posts-admin.js
Script Paths
/wp-content/plugins/select-all-posts/js/select-all-posts-admin.js
Version Parameters
select-all-posts/css/select-all-posts-admin.css?ver=select-all-posts/js/select-all-posts-admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-cwb-apply-on-everything
FAQ

Frequently Asked Questions about Select All Posts