Selected Categories Post Ordering Security & Risk Analysis

wordpress.org/plugins/selected-categories-post-ordering

Simple plugin to change the order of your posts for selected categories! Posts of selected categories will be displayed in chronological order.

0 active installs v1.1.1 PHP + WP 3.0.1+ Updated Sep 20, 2020
categories-posts-orderingchronologicalposts-orderposts-sortreverse-post-order
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Selected Categories Post Ordering Safe to Use in 2026?

Generally Safe

Score 85/100

Selected Categories Post Ordering has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'selected-categories-post-ordering' plugin v1.1.1 presents a generally positive security posture based on the static analysis provided. There are no identified dangerous functions, SQL injection vulnerabilities are mitigated by using prepared statements, and no file operations or external HTTP requests are made. The absence of any recorded CVEs, past or present, further contributes to a favorable security outlook. However, a notable concern arises from the 50% of output potentially not being properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if the unescaped output contains user-supplied data that is rendered directly in the browser. Additionally, the complete lack of capability checks and nonce checks across all entry points, even though the attack surface is currently zero, indicates a potential for security oversights if new entry points are introduced or existing ones are modified without proper security considerations. The absence of taint analysis results also means that potential data flow vulnerabilities might not have been detected.

Overall, the plugin shows good practices in core areas like SQL handling and avoiding risky functions. The primary weakness lies in output escaping, which requires attention. The complete absence of authentication and authorization checks on any potential entry points, combined with a lack of taint analysis, suggests a need for more thorough security validation and the implementation of these checks as the plugin evolves. While there are no current known vulnerabilities and the attack surface is reported as zero, the potential for XSS due to insufficient output escaping is a tangible risk. The plugin's history of no vulnerabilities is encouraging but does not negate the importance of addressing the identified code signals.

Key Concerns

  • 50% of outputs are not properly escaped
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Selected Categories Post Ordering Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Selected Categories Post Ordering Release Timeline

v1.1.1Current
v1.1.0
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Selected Categories Post Ordering Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

Selected Categories Post Ordering Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedincludes\class-selected-categories-post-ordering.php:144
actionadmin_enqueue_scriptsincludes\class-selected-categories-post-ordering.php:159
actionadmin_enqueue_scriptsincludes\class-selected-categories-post-ordering.php:160
actionadmin_menuincludes\class-selected-categories-post-ordering.php:161
actionadmin_initincludes\class-selected-categories-post-ordering.php:162
actionwp_enqueue_scriptsincludes\class-selected-categories-post-ordering.php:177
actionwp_enqueue_scriptsincludes\class-selected-categories-post-ordering.php:178
actionpre_get_postsincludes\class-selected-categories-post-ordering.php:179
Maintenance & Trust

Selected Categories Post Ordering Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedSep 20, 2020
PHP min version
Downloads962

Community Trust

Rating90/100
Number of ratings2
Active installs0
Developer Profile

Selected Categories Post Ordering Developer Profile

thevirajshelke

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Selected Categories Post Ordering

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/selected-categories-post-ordering/css/selected-categories-post-ordering-admin.css/wp-content/plugins/selected-categories-post-ordering/js/selected-categories-post-ordering-admin.js
Version Parameters
selected-categories-post-ordering/css/selected-categories-post-ordering-admin.css?ver=selected-categories-post-ordering/js/selected-categories-post-ordering-admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
id="scpo_options"
FAQ

Frequently Asked Questions about Selected Categories Post Ordering