
Smart Archives Reloaded Security & Risk Analysis
wordpress.org/plugins/smart-archives-reloadedEasily display posts grouped by year and month, in one or more elegant formats
Is Smart Archives Reloaded Safe to Use in 2026?
Generally Safe
Score 85/100Smart Archives Reloaded has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "smart-archives-reloaded" v2.0.5 plugin exhibits a mixed security posture. On the positive side, there are no known CVEs, the attack surface is minimal with only one shortcode and no unprotected entry points, and there are no external HTTP requests or bundled libraries. This suggests a generally well-maintained and secure codebase in terms of common plugin vulnerabilities and external dependencies.
However, the static analysis reveals significant concerns. A critical taint flow with unsanitized paths is a serious security risk, potentially leading to arbitrary file read or write vulnerabilities if exploited. Furthermore, all SQL queries are executed without prepared statements, which is a high risk for SQL injection vulnerabilities, especially when combined with user-supplied input. The low percentage of properly escaped output (20%) also indicates a potential for Cross-Site Scripting (XSS) vulnerabilities.
While the plugin has no recorded vulnerability history, the current code analysis raises flags that warrant attention. The absence of known CVEs could be due to a lack of public scrutiny or simply a fortunate history. The critical taint flow and the raw SQL queries are direct evidence of potential security weaknesses that need immediate remediation. The plugin's strengths lie in its limited attack surface and lack of external dependencies, but these are overshadowed by the critical taint flow and lack of SQL statement preparation.
Key Concerns
- Critical taint flow with unsanitized paths
- SQL queries not using prepared statements
- Low percentage of output escaping
- No capability checks
Smart Archives Reloaded Security Vulnerabilities
Smart Archives Reloaded Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Smart Archives Reloaded Attack Surface
Shortcodes 1
WordPress Hooks 12
Maintenance & Trust
Smart Archives Reloaded Maintenance & Trust
Maintenance Signals
Community Trust
Smart Archives Reloaded Alternatives
Disable Author Archives
disable-author-archives
Disable Author Archives completely removes author archives and makes the web server return status code 404 ('Not Found') instead.
Simple Yearly Archive
simple-yearly-archive
Simple Yearly Archive is a rather neat and simple Wordpress plugin that allows you to display your archives in a year-based list.
Advanced Posts/Page
advanced-posts-per-page
Fine grained control of how many of your posts appear on each of the various WordPress archive pages.
Collapsing Archives
collapsing-archives
This plugin uses Javascript to dynamically expand or collapse the set of months for each year and posts for each month in the archive listing of your …
Sitekit
sitekit
Widgets: search, archives and categories. Shortcodes: archives, bloginfo, iframe and categories.
Smart Archives Reloaded Developer Profile
20 plugins · 28K total installs
How We Detect Smart Archives Reloaded
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/smart-archives-reloaded/admin/admin.js/wp-content/plugins/smart-archives-reloaded/admin/admin.dev.js/wp-content/plugins/smart-archives-reloaded/admin/admin.js/wp-content/plugins/smart-archives-reloaded/admin/admin.dev.jssmart-archives-reloaded/admin/admin.js?ver=1.9smart-archives-reloaded/admin/admin.dev.js?ver=1.9HTML / DOM Fingerprints
SAR_Settings