Three Column Screen Layout Security & Risk Analysis

wordpress.org/plugins/three-column-screen-layout

Three, four and five column screen layouts for the post editor.

1K active installs v4.2 PHP + WP 3.4+ Updated Dec 12, 2016
admincolumncolumnsediteditor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Three Column Screen Layout Safe to Use in 2026?

Generally Safe

Score 85/100

Three Column Screen Layout has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "three-column-screen-layout" plugin version 4.2 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified CVEs, coupled with zero critical or high severity vulnerabilities in its history, suggests a history of relatively secure development. The static analysis also reveals no dangerous functions, file operations, or external HTTP requests, and all SQL queries utilize prepared statements. The plugin also has a minimal attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or permission checks. This indicates a focus on secure coding practices and a limited scope of functionality, which generally correlates with lower risk.

However, the analysis does flag a concern regarding output escaping. With one total output identified and 0% properly escaped, this represents a significant potential risk. If this output contains user-supplied data or dynamic content, it could be susceptible to cross-site scripting (XSS) vulnerabilities. While the taint analysis shows no unsanitized paths, the lack of proper output escaping on all identified outputs is a notable weakness that should be addressed. The absence of nonce checks and capability checks, while not explicitly flagged as vulnerabilities in this specific analysis due to the zero attack surface, could become a risk if the plugin's functionality were to expand in the future. Overall, the plugin is well-coded from a historical and general practice perspective, but the unescaped output is a critical area for improvement.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Three Column Screen Layout Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Three Column Screen Layout Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Three Column Screen Layout Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_headthree-column-screen-layout.php:33
actionadmin_footerthree-column-screen-layout.php:34
actionadmin_enqueue_scriptsthree-column-screen-layout.php:35
Maintenance & Trust

Three Column Screen Layout Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 12, 2016
PHP min version
Downloads16K

Community Trust

Rating76/100
Number of ratings16
Active installs1K
Developer Profile

Three Column Screen Layout Developer Profile

Chad Hovell

1 plugin · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Three Column Screen Layout

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/three-column-screen-layout/style.min.css
Version Parameters
three-column-screen-layout/style.min.css?v=4.2

HTML / DOM Fingerprints

CSS Classes
postbox-containercolumns-prefs-icon
Data Attributes
id="postbox-container-3"id="postbox-container-4"
FAQ

Frequently Asked Questions about Three Column Screen Layout