Templates for Posts Security & Risk Analysis

wordpress.org/plugins/templates-for-posts

The same as page templates, but for posts.

10 active installs v1.0 PHP + WP 2.7+ Updated Feb 1, 2009
postpoststemplatetemplates
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Templates for Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Templates for Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "templates-for-posts" v1.0 plugin appears to have a strong security posture. The absence of any identified attack surface points, dangerous functions, direct SQL queries, or unescaped output suggests that the developers have followed good security practices. The taint analysis also shows no critical or high-severity issues, further reinforcing the impression of a secure codebase. The complete lack of any recorded vulnerabilities, critical or otherwise, is a significant positive indicator. This suggests a history of responsible development and prompt patching, or simply that no exploitable flaws have been discovered or reported.

However, it's important to note that the analysis results show zero entries for several key security indicators, such as AJAX handlers, REST API routes, shortcodes, cron events, dangerous functions, SQL queries, output escaping, file operations, external HTTP requests, nonce checks, capability checks, and taint flows. While this can be interpreted as a lack of vulnerable code, it could also indicate that the analysis was limited in scope, or that the plugin has a very minimal functionality, thus presenting a small attack surface. If the plugin *does* perform sensitive operations not reflected in these zero counts, then the absence of checks becomes a concern.

In conclusion, the "templates-for-posts" v1.0 plugin exhibits excellent security characteristics based on the data presented, with no immediate red flags or historical vulnerabilities. The code appears well-hardened, and the plugin's history is clean. The primary caveat is the possibility of a limited analysis scope or minimal plugin functionality, which would explain the zero counts across many security metrics. As such, while the current assessment is highly positive, it would be prudent to ensure the analysis covered all intended plugin functionalities.

Vulnerabilities
None known

Templates for Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Templates for Posts Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

Templates for Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Templates for Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actiontemplate_redirecttemplates-for-posts.php:53
actionsave_posttemplates-for-posts.php:54
actionadmin_menutemplates-for-posts.php:56
Maintenance & Trust

Templates for Posts Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedFeb 1, 2009
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Templates for Posts Developer Profile

Nikolay Bachiyski

7 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Templates for Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
hidden
FAQ

Frequently Asked Questions about Templates for Posts