Stories Post Type Security & Risk Analysis

wordpress.org/plugins/stories-post-type

This plugin adds a Stories custom post type with thumbnails and revisions enabled and three taxonomies: Works, Sections and Licenses.

10 active installs v1.2.2 PHP + WP 3.0.0+ Updated Unknown
custom-postcustom-taxonomies
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stories Post Type Safe to Use in 2026?

Generally Safe

Score 100/100

Stories Post Type has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "stories-post-type" plugin v1.2.2 exhibits a mixed security posture, with several concerning practices despite a lack of publicly disclosed vulnerabilities. The presence of the `create_function` function is a significant red flag, as it is deprecated and can lead to arbitrary code execution if user input is improperly handled. Furthermore, all SQL queries are executed without prepared statements, creating a high risk of SQL injection vulnerabilities. The low percentage of properly escaped output (25%) indicates a widespread issue where user-controlled data could be injected into the application, potentially leading to cross-site scripting (XSS) attacks. The taint analysis revealing two flows with unsanitized paths further supports the risk of injection vulnerabilities.

Despite these significant code-level risks, the plugin's vulnerability history is clean, with no recorded CVEs. This could indicate that the vulnerabilities are either undiscovered, not severe enough to warrant public disclosure, or the plugin has not been a target. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, is a positive aspect. However, the potential for severe vulnerabilities stemming from the insecure coding practices outweighs the benefits of a small attack surface. The lack of nonce and capability checks is also a concern, especially if any of the identified insecure code paths are exposed to unauthenticated users.

In conclusion, while the plugin has a clean vulnerability history and a limited attack surface, the static analysis reveals critical security weaknesses. The use of `create_function`, raw SQL queries, and poor output escaping practices present a substantial risk of code execution and injection vulnerabilities. These issues require immediate attention and remediation.

Key Concerns

  • Dangerous function: create_function
  • SQL queries without prepared statements
  • Low percentage of properly escaped output
  • Taint analysis: Unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Stories Post Type Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stories Post Type Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
0 prepared
Unescaped Output
44
15 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'return register_widget( "widget_stories_pt_recent"stories-post-type.php:279

SQL Query Safety

0% prepared2 total queries

Output Escaping

25% escaped59 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
stories_pt_category_order_options (stories-post-type.php:394)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Stories Post Type Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[indexofstories] stories-post-type.php:297
WordPress Hooks 9
actioninitstories-post-type.php:66
actioninitstories-post-type.php:197
actionwidgets_initstories-post-type.php:279
filteranth_available_post_typesstories-post-type.php:307
actionadmin_headstories-post-type.php:332
actionadmin_menustories-post-type.php:333
actionadmin_menustories-post-type.php:334
filterget_termsstories-post-type.php:336
actionsm_buildmapstories-post-type.php:551
Maintenance & Trust

Stories Post Type Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Stories Post Type Developer Profile

Fran Ontanaya

2 plugins · 210 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stories Post Type

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stories-post-type/widget-stories-pt-recent.js/wp-content/plugins/stories-post-type/widget-stories-pt-recent.css
Script Paths
/wp-content/plugins/stories-post-type/widget-stories-pt-recent.js
Version Parameters
stories-post-type/widget-stories-pt-recent.js?ver=stories-post-type/widget-stories-pt-recent.css?ver=

HTML / DOM Fingerprints

CSS Classes
widget_stories_pt_recent
JS Globals
widget_stories_pt_recent
Shortcode Output
[stories]
FAQ

Frequently Asked Questions about Stories Post Type