
Stories Post Type Security & Risk Analysis
wordpress.org/plugins/stories-post-typeThis plugin adds a Stories custom post type with thumbnails and revisions enabled and three taxonomies: Works, Sections and Licenses.
Is Stories Post Type Safe to Use in 2026?
Generally Safe
Score 100/100Stories Post Type has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "stories-post-type" plugin v1.2.2 exhibits a mixed security posture, with several concerning practices despite a lack of publicly disclosed vulnerabilities. The presence of the `create_function` function is a significant red flag, as it is deprecated and can lead to arbitrary code execution if user input is improperly handled. Furthermore, all SQL queries are executed without prepared statements, creating a high risk of SQL injection vulnerabilities. The low percentage of properly escaped output (25%) indicates a widespread issue where user-controlled data could be injected into the application, potentially leading to cross-site scripting (XSS) attacks. The taint analysis revealing two flows with unsanitized paths further supports the risk of injection vulnerabilities.
Despite these significant code-level risks, the plugin's vulnerability history is clean, with no recorded CVEs. This could indicate that the vulnerabilities are either undiscovered, not severe enough to warrant public disclosure, or the plugin has not been a target. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, is a positive aspect. However, the potential for severe vulnerabilities stemming from the insecure coding practices outweighs the benefits of a small attack surface. The lack of nonce and capability checks is also a concern, especially if any of the identified insecure code paths are exposed to unauthenticated users.
In conclusion, while the plugin has a clean vulnerability history and a limited attack surface, the static analysis reveals critical security weaknesses. The use of `create_function`, raw SQL queries, and poor output escaping practices present a substantial risk of code execution and injection vulnerabilities. These issues require immediate attention and remediation.
Key Concerns
- Dangerous function: create_function
- SQL queries without prepared statements
- Low percentage of properly escaped output
- Taint analysis: Unsanitized paths
- No nonce checks
- No capability checks
Stories Post Type Security Vulnerabilities
Stories Post Type Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Stories Post Type Attack Surface
Shortcodes 1
WordPress Hooks 9
Maintenance & Trust
Stories Post Type Maintenance & Trust
Maintenance Signals
Community Trust
Stories Post Type Alternatives
Meta Box
meta-box
Meta Box plugin is a powerful, professional developer toolkit to create custom meta boxes and custom fields for your custom post types in WordPress.
Pods – Custom Content Types and Fields
pods
Pods is a framework for creating, managing, and deploying customized content types and fields for any project.
MB Custom Post Types & Custom Taxonomies
mb-custom-post-type
Create and manage custom post types and custom taxonomies with an easy-to-use UI in WordPress.
CubeWP Framework
cubewp-framework
CubeWP is an end-to-end dynamic content framework for WordPress to help you shrink time and cut cost of development up to 90%.
Custom post types, Custom Fields & more
custom-post-types
Custom Post Types, Custom Fields, Custom Taxonomies, Custom Templates, Custom Admin Pages, Custom Admin Notices. Directly from the WP dashboard.
Stories Post Type Developer Profile
2 plugins · 210 total installs
How We Detect Stories Post Type
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/stories-post-type/widget-stories-pt-recent.js/wp-content/plugins/stories-post-type/widget-stories-pt-recent.css/wp-content/plugins/stories-post-type/widget-stories-pt-recent.jsstories-post-type/widget-stories-pt-recent.js?ver=stories-post-type/widget-stories-pt-recent.css?ver=HTML / DOM Fingerprints
widget_stories_pt_recentwidget_stories_pt_recent[stories]