Smart Post Lists Light Security & Risk Analysis

wordpress.org/plugins/smart-post-lists-light

Create custom post lists based on options you choose from a form in a widget. Different types of lists, blog, portfolio, services pages. No coding.

300 active installs v1.8 PHP + WP 3.0+ Updated Mar 29, 2022
authorsblogcustom-post-listfeatured-imagepost-list
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Smart Post Lists Light Safe to Use in 2026?

Generally Safe

Score 85/100

Smart Post Lists Light has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "smart-post-lists-light" v1.8 plugin exhibits a generally good security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with exposed entry points is a significant strength, minimizing the direct attack surface. Furthermore, the plugin demonstrates responsible SQL handling by exclusively using prepared statements, and the presence of nonce and some capability checks suggests an awareness of security best practices. However, the use of the `unserialize` function, while not immediately flagged by taint analysis in this instance, represents a significant potential risk. If serialized data can be controlled by an attacker, `unserialize` can lead to Remote Code Execution. The lack of recorded vulnerabilities in its history is positive, but it does not entirely mitigate the inherent risk of the `unserialize` function being present.

While the plugin avoids common pitfalls like unescaped output (with a decent escapement rate) and raw SQL queries, the `unserialize` function remains a critical concern. The limited number of file operations and external HTTP requests are also positive indicators. The absence of taint flow findings is encouraging, but the static analysis of `unserialize` itself is a red flag that warrants attention. In conclusion, the plugin is well-structured with a small attack surface and good SQL practices. The primary weakness lies in the presence of the `unserialize` function, which, if exploited in conjunction with an external data source, could pose a serious security threat. The clean vulnerability history is a good sign, but the potential for a vulnerability to exist due to `unserialize` cannot be ignored.

Key Concerns

  • Use of unserialize() function
  • Low output escaping rate (68%)
  • No capability checks
Vulnerabilities
None known

Smart Post Lists Light Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Smart Post Lists Light Release Timeline

v1.7
v1.6
v1.5
v1.4
v1.3
v1.2
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Smart Post Lists Light Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
49
103 escaped
Nonce Checks
2
Capability Checks
0
File Operations
3
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$value = unserialize( urldecode( $value ) );include\otw_components\otw_functions\otw_functions.php:600

Output Escaping

68% escaped152 total outputs
Attack Surface

Smart Post Lists Light Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_menuinclude\otw_components\otw_factory\otw_factory.class.php:34
actionadmin_print_stylesinclude\otw_components\otw_factory\otw_factory.class.php:36
actionadmin_noticesinclude\otw_components\otw_factory\otw_factory.class.php:38
filterpre_set_site_transient_update_pluginsinclude\otw_components\otw_factory\otw_factory.class.php:40
filterplugins_apiinclude\otw_components\otw_factory\otw_factory.class.php:42
actionwp_enqueue_scriptsinclude\otw_components\otw_functions\otw_component.class.php:90
actionadmin_enqueue_scriptsinclude\otw_components\otw_functions\otw_component.class.php:94
actionadmin_print_scriptssplw.php:594
actionadmin_headsplw.php:595
actionadmin_menusplw.php:669
filterotwfcr_noticesplw.php:671
actionwidgets_initsplw.php:704
actioninitsplw.php:705
Maintenance & Trust

Smart Post Lists Light Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 29, 2022
PHP min version
Downloads28K

Community Trust

Rating76/100
Number of ratings4
Active installs300
Developer Profile

Smart Post Lists Light Developer Profile

OTWthemes

12 plugins · 6K total installs

70
trust score
Avg Security Score
66/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Smart Post Lists Light

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smart-post-lists-light/css/style.css/wp-content/plugins/smart-post-lists-light/js/splw-widget-admin.js
Script Paths
/wp-content/plugins/smart-post-lists-light/js/splw-widget-admin.js
Version Parameters
smart-post-lists-light/css/style.css?ver=smart-post-lists-light/js/splw-widget-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
widget.smart-post-list
HTML Comments
<!-- Make lists of posts selected from the database based on options you choose from a form. --><!-- Want more options + support --><!-- Smart Post Lists Light Widget -->
Data Attributes
data-widget-iddata-widget-titledata-show-titledata-show-datedata-show-excerptdata-excerpt-words-count+8 more
JS Globals
setSuggest
FAQ

Frequently Asked Questions about Smart Post Lists Light