
Super Hide Post Security & Risk Analysis
wordpress.org/plugins/super-hide-postEnables you to control the visibility of items on your blog by making posts/pages hidden on some parts of your blog, while still visible in other part …
Is Super Hide Post Safe to Use in 2026?
Generally Safe
Score 85/100Super Hide Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'super-hide-post' v1.0 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any detected attack surface points (AJAX, REST API, shortcodes, cron events) is a strong indicator that the plugin does not expose common entry points for attackers. Furthermore, the lack of dangerous functions, file operations, and external HTTP requests suggests a contained and focused functionality, reducing the potential for many common attack vectors. The vulnerability history being entirely clear is also a significant positive, indicating a history of responsible development or a lack of past exploitation.
However, there are areas for concern that prevent a perfect score. The SQL query analysis reveals that a substantial portion (89%) of queries do not utilize prepared statements, posing a significant risk of SQL injection vulnerabilities. Additionally, the output escaping is poorly implemented, with only 18% of outputs being properly escaped, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities. The complete absence of nonce and capability checks across all potential entry points, if any were to be discovered, is a critical oversight that leaves the plugin susceptible to various forms of unauthorized actions and CSRF attacks.
In conclusion, while the plugin's limited attack surface and clean vulnerability history are commendable, the identified risks in SQL query handling and output escaping, coupled with the absence of critical security checks like nonces and capabilities, necessitate careful attention. Addressing these specific code-level weaknesses is crucial to improving the plugin's overall security and mitigating potential exploitation.
Key Concerns
- SQL queries without prepared statements
- Insufficient output escaping
- No nonce checks
- No capability checks
Super Hide Post Security Vulnerabilities
Super Hide Post Code Analysis
SQL Query Safety
Output Escaping
Super Hide Post Attack Surface
WordPress Hooks 7
Maintenance & Trust
Super Hide Post Maintenance & Trust
Maintenance Signals
Community Trust
Super Hide Post Alternatives
Hide Admin Menu
hide-admin-menu
Using this plugin, we can hide the admin menu easily.
Hide Posts
whp-hide-posts
Allows you to hide any posts on the home page, category page, search page, tags page, authors page, RSS Feed, REST API, XML sitemaps, SEO integrations …
Hide Featured Image
hide-featured-image
To Hide Featured Image on single post/page.
Show/Hide Content at Set Time
shortcodes-to-show-or-hide-content
Shortcodes to wrap around text, which specify at what date or time that content should appear or disappear, either once, or on a recurring basis.
Show-Hide / Collapse-Expand
show-hidecollapse-expand
Save space on your pages, posts, sidebars. Hide the content before user clicks to see it. Collapse long lists, create FAQs & more.
Super Hide Post Developer Profile
1 plugin · 200 total installs
How We Detect Super Hide Post
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/super-hide-post/super-hide-post.phpHTML / DOM Fingerprints
<!-- WPHP: data-lp-flagdata-lp-value