SuperLight CPT Manager Security & Risk Analysis

wordpress.org/plugins/superlight-cpt-manager

Create and manage custom post types instantly. Each CPT gets its own shortcode.

10 active installs v1.2.1 PHP + WP 5.5+ Updated Feb 4, 2026
cptcustom-post-typelightweightshortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SuperLight CPT Manager Safe to Use in 2026?

Generally Safe

Score 100/100

SuperLight CPT Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The plugin "superlight-cpt-manager" v1.2.1 exhibits a generally strong security posture based on the provided static analysis. The absence of known CVEs, critical or high severity taint flows, and the use of prepared statements for all SQL queries are significant strengths. Furthermore, the analysis indicates good practices like nonce and capability checks for some entry points, and no dangerous functions or file operations are present. However, there are areas for improvement. A significant portion of output (45%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data reaches these outputs. While the attack surface is small, the potential for exploitation of unescaped output remains a concern, especially if any of the output points can be influenced by external input.

The vulnerability history is clean, which is a positive indicator of the developer's attention to security. However, this does not negate the risks identified in the static analysis. The lack of proper output escaping is the primary weakness identified. While the plugin has a limited number of entry points and no known vulnerabilities, the potential for an XSS flaw due to unescaped output means the plugin is not entirely risk-free. Users should be aware of this potential weakness, and developers should prioritize addressing the unescaped output to further strengthen the plugin's security.

Key Concerns

  • Unescaped output detected (45%)
Vulnerabilities
None known

SuperLight CPT Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SuperLight CPT Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
21 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

55% escaped38 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
superlight_cpt_manager_page (superlight-cpt-manager.php:103)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SuperLight CPT Manager Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[superlight_cpt] superlight-cpt-manager.php:234
WordPress Hooks 2
actioninitsuperlight-cpt-manager.php:54
actionadmin_menusuperlight-cpt-manager.php:85
Maintenance & Trust

SuperLight CPT Manager Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 4, 2026
PHP min version
Downloads141

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

SuperLight CPT Manager Developer Profile

Ryan Edmunds

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SuperLight CPT Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[superlight_cpt slug="%s"]
FAQ

Frequently Asked Questions about SuperLight CPT Manager