Simple custom post likes Security & Risk Analysis

wordpress.org/plugins/simple-custom-post-likes

Appends a custom likes box that allows a user to like any post type from the front end.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Mar 12, 2015
custom-post-typesfeaturedlikes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Simple custom post likes Safe to Use in 2026?

Generally Safe

Score 85/100

Simple custom post likes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The plugin "simple-custom-post-likes" v1.0 exhibits a concerning security posture due to multiple unprotected entry points and a lack of robust security practices. The static analysis reveals two AJAX handlers, both lacking authentication checks, creating a significant attack surface. This directly exposes functionality to unauthenticated users, potentially allowing for unauthorized actions. Furthermore, the analysis indicates that 100% of output escaping is improperly implemented, meaning user-supplied data or plugin-generated content could be vulnerable to cross-site scripting (XSS) attacks. While the vulnerability history is clean, this lack of past issues does not negate the identified code-level risks. The presence of raw SQL queries without prepared statements also poses a risk of SQL injection, especially when combined with unsanitized input.

Key Concerns

  • Unprotected AJAX handlers
  • No output escaping
  • SQL queries without prepared statements
  • No nonce checks on AJAX
  • No capability checks
Vulnerabilities
None known

Simple custom post likes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple custom post likes Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

0% escaped8 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<admin> (admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Simple custom post likes Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_myFunctionindex.php:62
noprivwp_ajax_myFunctionindex.php:63
WordPress Hooks 4
actionwp_enqueue_scriptsindex.php:70
actionadmin_menuindex.php:78
actionwp_headindex.php:85
filterthe_contentindex.php:160
Maintenance & Trust

Simple custom post likes Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 12, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Simple custom post likes Developer Profile

richymilo

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple custom post likes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-custom-post-likes/assets/css/style.css

HTML / DOM Fingerprints

CSS Classes
user_favourite
Data Attributes
id="user_favourite"type="button"
JS Globals
ajaxurl
FAQ

Frequently Asked Questions about Simple custom post likes