Post Badges Security & Risk Analysis

wordpress.org/plugins/templatic-badge

The Templatic Badge plugins add the ability to add badges and it's respective colour you wants to show in front end.

400 active installs v1.0.1 PHP + WP 3.5+ Updated Oct 27, 2018
badgespost-titletemplatic
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Badges Safe to Use in 2026?

Generally Safe

Score 85/100

Post Badges has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "templatic-badge" v1.0.1 plugin exhibits a generally strong security posture based on the static analysis and vulnerability history. The absence of any known CVEs and a clean vulnerability history across all severities suggests a well-maintained and secure codebase up to this point.

However, the static analysis reveals a significant concern: 100% of the identified output operations are not properly escaped. This represents a substantial risk, as it leaves the plugin vulnerable to cross-site scripting (XSS) attacks. While the plugin has a nonce check, the lack of capability checks on its entry points (even though there are no identified entry points in this analysis) and the absence of taint analysis data for unsanitized paths prevent a more comprehensive assessment of potential data manipulation risks. The complete lack of any identified attack surface or taint flows is unusual and might indicate limitations in the analysis itself or an extremely simple plugin.

In conclusion, while the plugin benefits from a clean vulnerability history and good practices like prepared SQL statements, the unescaped output is a critical weakness that needs immediate attention. Addressing this XSS vulnerability should be the top priority to improve the plugin's overall security.

Key Concerns

  • Output operations are not properly escaped
Vulnerabilities
None known

Post Badges Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Badges Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Post Badges Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptstemplatic-badge.php:16
actionadmin_noticestemplatic-badge.php:30
actionadmin_inittemplatic-badge.php:47
actionsave_posttemplatic-badge.php:50
filterthe_titletemplatic-badge.php:165
actionwp_headtemplatic-badge.php:191
Maintenance & Trust

Post Badges Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedOct 27, 2018
PHP min version
Downloads8K

Community Trust

Rating70/100
Number of ratings6
Active installs400
Developer Profile

Post Badges Developer Profile

templatic1

6 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Badges

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/templatic-badge/languages/

HTML / DOM Fingerprints

CSS Classes
badge-status
Data Attributes
id="newbadge_color_picker"id="close_newbadge_color_picker"id="color_newbadge_color_picker"name="newbadge_color_picker"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Post Badges