Simple Preview Security & Risk Analysis

wordpress.org/plugins/simple-preview

Let anonymous users preview a post before it is published!

200 active installs v0.1.9 PHP + WP 2.7+ Updated Aug 3, 2018
anonymousdraftpostpublicsimple-preview
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Preview Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Preview has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'simple-preview' plugin exhibits a generally good security posture based on the provided static analysis. The complete absence of identified attack vectors like AJAX handlers, REST API routes, shortcodes, and cron events is a significant strength. Furthermore, the code's diligent use of prepared statements for SQL queries and the presence of a capability check are positive indicators of secure coding practices. The lack of known vulnerabilities in its history further reinforces this perception of a well-maintained and secure plugin.

However, the static analysis does reveal a critical weakness: zero percent of output is properly escaped. With two total outputs identified, this means both are potentially vulnerable to cross-site scripting (XSS) attacks. This is a significant concern that could allow attackers to inject malicious scripts into a user's browser, leading to session hijacking, credential theft, or defacement.

While the plugin's attack surface is effectively zero and its vulnerability history is clean, the unescaped output represents a tangible and serious risk. Users should be aware that any information displayed by this plugin is not being adequately protected against injection. In conclusion, the plugin is strong in its minimal attack surface and historical security but significantly weakened by its handling of output rendering.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

Simple Preview Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Preview Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Simple Preview Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitsimple-preview.php:57
actionadmin_menusimple-preview.php:60
actionsave_postsimple-preview.php:61
actionpost_submitbox_misc_actionssimple-preview.php:73
actionpre_get_postssimple-preview.php:136
filterposts_resultssimple-preview.php:139
Maintenance & Trust

Simple Preview Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedAug 3, 2018
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

Simple Preview Developer Profile

Nagmay

5 plugins · 250 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Preview

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-preview/simple-preview.php

HTML / DOM Fingerprints

CSS Classes
simple-preview
HTML Comments
<!--Preview is not available-->
Data Attributes
name="public_preview_status"id="public_preview_status"value="on"
FAQ

Frequently Asked Questions about Simple Preview