
Selective Reading Security & Risk Analysis
wordpress.org/plugins/selective-readingAllows website visitors to deselect categories they don't want to see on your blog.
Is Selective Reading Safe to Use in 2026?
Generally Safe
Score 85/100Selective Reading has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "selective-reading" plugin version 0.3.1 demonstrates an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, raw SQL queries, file operations, or external HTTP requests is commendable. Crucially, all detected SQL queries utilize prepared statements, and there are no unescaped output concerns, minimizing common attack vectors. The plugin also exhibits zero identified CVEs, with no history of past vulnerabilities, suggesting a proactive and secure development approach.
However, the static analysis reveals a complete lack of entry points like AJAX handlers, REST API routes, shortcodes, or cron events. While this implies a very small attack surface, it also raises a question about the plugin's actual functionality and how it integrates with WordPress. Furthermore, the complete absence of nonce checks and capability checks, while not directly indicating a vulnerability given the lack of entry points, means that if any entry points were to be added in the future, they would be inherently unprotected. This lack of fundamental security checks on any potential (even if currently non-existent) entry points represents a significant oversight in defensive programming practices.
In conclusion, the plugin's current state is highly secure due to its apparent lack of functionality and robust handling of its (non-existent) code. The clean vulnerability history and absence of dangerous code patterns are significant strengths. The primary concern lies in the complete absence of essential security mechanisms like nonce and capability checks, which, while not exploitable now, create a weakness that could be exploited if the plugin evolves to include any form of user interaction or data processing.
Key Concerns
- Missing nonce checks
- Missing capability checks
Selective Reading Security Vulnerabilities
Selective Reading Release Timeline
Selective Reading Code Analysis
Selective Reading Attack Surface
WordPress Hooks 4
Maintenance & Trust
Selective Reading Maintenance & Trust
Maintenance Signals
Community Trust
Selective Reading Alternatives
Ultimate Category Excluder
ultimate-category-excluder
Ultimate Category Excluder allows you to quickly and easily exclude categories from your front page, archives, feeds, and search results.
Simple Exclude Categories
simple-exclude-categories
Hide posts in categories on WordPress Homepage
Widget Master
wp-widget-master
The Widget Master plugin lets visitors to choose what widgets/blocks he want or wont to see on your pages. Visitor can hide widgets per PHP session.
WP Statistics – Simple, privacy-friendly Google Analytics alternative
wp-statistics
Get website traffic insights with GDPR/CCPA compliant, privacy-friendly analytics. Includes visitor data, stunning graphs, and no data sharing.
Exclude Pages
exclude-pages
This plugin adds a checkbox, “include this page in menus”, uncheck this to exclude pages from the page navigation that users see on your site.
Selective Reading Developer Profile
1 plugin · 10 total installs
How We Detect Selective Reading
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/selective-reading/selective-reading.css/wp-content/plugins/selective-reading/selective-reading.js/wp-content/plugins/selective-reading/selective-reading.jsHTML / DOM Fingerprints
wp-selective-reading-toggle-wp-selective-reading-linkwp_selective_reading_set_category_state(wp_selective_reading_clear_cookies();wp_selective_reading_set_category_statewp_selective_reading_clear_cookies