Tailored Easy Exclude Security & Risk Analysis

wordpress.org/plugins/tailored-easy-exclude

Small plugin that allows you to exclude pages or posts from WordPress administration post/page listing, and post/page can be excluded per user role.

30 active installs v1.1 PHP + WP 3.7.1+ Updated Jun 26, 2014
excludeexclude-admin-pageexclude-pageexclude-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Tailored Easy Exclude Safe to Use in 2026?

Generally Safe

Score 85/100

Tailored Easy Exclude has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The tailored-easy-exclude v1.1 plugin exhibits a generally good security posture with no known historical vulnerabilities or critical code signals. The absence of known CVEs and common vulnerability types is a strong positive indicator. Furthermore, the plugin demonstrates sound practices by exclusively using prepared statements for its single SQL query and avoiding file operations and external HTTP requests, minimizing common attack vectors.

However, there are notable concerns stemming from the static analysis. The primary weakness lies in the output escaping, with only 17% of outputs being properly escaped, leaving a significant portion vulnerable to cross-site scripting (XSS) attacks. Additionally, the taint analysis revealed a flow with an unsanitized path, which, while not flagged as critical or high severity in this analysis, represents a potential entry point for malicious input that could be exploited if combined with other weaknesses or specific usage patterns. The lack of nonce and capability checks across all entry points also leaves the plugin susceptible to CSRF attacks and unauthorized access if any entry points were to be discovered or added in the future.

In conclusion, while the plugin avoids many common pitfalls and has a clean vulnerability history, the poor output escaping and the identified unsanitized taint flow are significant weaknesses that require attention. The absence of protective measures like nonce and capability checks on its entry points, though currently zero, indicates a lack of defensive programming that could become a problem. Addressing the output escaping and investigating the unsanitized taint flow are the most immediate priorities for improving the plugin's security.

Key Concerns

  • Low percentage of properly escaped output
  • Unsanitized path in taint flow
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Tailored Easy Exclude Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Tailored Easy Exclude Release Timeline

v1.1Current
v1.0
Code Analysis
Analyzed Apr 16, 2026

Tailored Easy Exclude Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
10
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery

SQL Query Safety

100% prepared1 total queries

Output Escaping

17% escaped12 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<class-tailored-easy-exclude-admin> (admin/class-tailored-easy-exclude-admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Tailored Easy Exclude Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_enqueue_scriptsadmin/class-tailored-easy-exclude-admin.php:48
actionadmin_enqueue_scriptsadmin/class-tailored-easy-exclude-admin.php:49
actionadmin_menuadmin/class-tailored-easy-exclude-admin.php:52
actionadmin_initadmin/class-tailored-easy-exclude-admin.php:59
actionpre_get_postsadmin/class-tailored-easy-exclude-admin.php:62
actionwp_count_postsadmin/class-tailored-easy-exclude-admin.php:414
actionwp_count_postsadmin/class-tailored-easy-exclude-admin.php:422
actioninitpublic/class-tailored-easy-exclude.php:57
actionwpmu_new_blogpublic/class-tailored-easy-exclude.php:60
actionplugins_loadedtailored-easy-exclude.php:46
actionplugins_loadedtailored-easy-exclude.php:58
Maintenance & Trust

Tailored Easy Exclude Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedJun 26, 2014
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings3
Active installs30
Developer Profile

Tailored Easy Exclude Developer Profile

zugrina

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Tailored Easy Exclude

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tailored-easy-exclude/assets/css/chosen.css/wp-content/plugins/tailored-easy-exclude/assets/js/chosen.jquery.min.js/wp-content/plugins/tailored-easy-exclude/assets/js/admin.js
Script Paths
/wp-content/plugins/tailored-easy-exclude/assets/js/chosen.jquery.min.js/wp-content/plugins/tailored-easy-exclude/assets/js/admin.js
Version Parameters
tailored-easy-exclude/assets/css/chosen.css?ver=tailored-easy-exclude/assets/js/chosen.jquery.min.js?ver=tailored-easy-exclude/assets/js/admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-placeholder
FAQ

Frequently Asked Questions about Tailored Easy Exclude