Super Recent Posts Widget Security & Risk Analysis

wordpress.org/plugins/super-recent-posts-widget

Drag and drop the widget and fill out the appropriate fields. Some notes:

50 active installs v0.3.0 PHP + WP 3.6+ Updated Jan 21, 2020
postwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Super Recent Posts Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Super Recent Posts Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "super-recent-posts-widget" plugin version 0.3.0 exhibits a generally good security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events, particularly those without authentication or permission checks, significantly limits the plugin's attack surface. Furthermore, the lack of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are strong indicators of secure coding practices. The plugin's vulnerability history also shows no recorded CVEs, suggesting a history of responsible development regarding security.

However, a critical weakness lies in the complete lack of output escaping. With one total output identified and 0% properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the widget that is not properly escaped before rendering in the browser could be exploited by attackers to inject malicious scripts. The absence of nonce checks and capability checks on entry points, while the entry points themselves are currently zero, also means that if any were introduced in the future without these security measures, the plugin would be immediately vulnerable. The absence of taint analysis results might be due to the limited code analyzed or the simplicity of the plugin, but the unescaped output is a concrete, actionable risk.

In conclusion, while the plugin has a commendable lack of complex entry points and secure data handling for SQL, the unescaped output is a severe and direct security concern that overshadows these strengths. The potential for XSS is high and requires immediate attention. The plugin's history of no vulnerabilities is positive, but it does not mitigate the present risk of unescaped output.

Key Concerns

  • Unescaped output detected
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Super Recent Posts Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Super Recent Posts Widget Release Timeline

v0.3.0Current
v0.2.7
v0.2.6
v0.2.4
v0.2.3
v0.2.2
v0.2.1
v0.2.0
v0.1.4
v0.1.3
vtemp
Code Analysis
Analyzed Mar 16, 2026

Super Recent Posts Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Super Recent Posts Widget Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Super Recent Posts Widget Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 21, 2020
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs50
Developer Profile

Super Recent Posts Widget Developer Profile

Mat Gargano

4 plugins · 150 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Super Recent Posts Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Super Recent Posts Widget