Tied Pages Security & Risk Analysis

wordpress.org/plugins/tied-pages

Tie a page to a master page to adopt the master content. If you change the master page, the changes are automatically applied to the tied page(s).

0 active installs v0.2.0 PHP 7.3+ WP 5.6+ Updated Apr 27, 2021
linked-datamaster-pagetiedtied-pagestied-data
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Tied Pages Safe to Use in 2026?

Generally Safe

Score 85/100

Tied Pages has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "tied-pages" plugin v0.2.0 exhibits a generally strong security posture, with no known historical vulnerabilities and a clean bill of health in terms of common attack vectors like AJAX handlers, REST API routes, and shortcodes. The codebase also demonstrates good practices by largely utilizing prepared statements for its SQL queries and including a nonce check and capability check. This suggests a developer who is aware of fundamental WordPress security principles.

However, the static analysis did reveal two concerning taint flows with unsanitized paths, both flagged as high severity. While the total number of flows analyzed is small, the presence of two high-severity issues indicates potential weaknesses in how data is handled within the plugin, which could be exploited if an attacker can control the input leading to these flows. The low percentage of properly escaped output (33%) is also a concern, as it increases the risk of cross-site scripting (XSS) vulnerabilities, especially if user-provided data is involved in these unescaped outputs.

Despite the absence of historical vulnerabilities, the detected taint flows and the poor output escaping warrant attention. The plugin's strengths lie in its minimal attack surface and good SQL practices, but the identified taint issues and escaping deficiencies are clear weaknesses that should be addressed to ensure a more robust security profile.

Key Concerns

  • High severity taint flows found
  • Low percentage of properly escaped output
Vulnerabilities
None known

Tied Pages Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Tied Pages Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
8 prepared
Unescaped Output
10
5 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

89% prepared9 total queries

Output Escaping

33% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
update_tied_pages (includes\core_controller_class.php:28)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Tied Pages Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadd_meta_boxes_pageincludes\admin_page_edit_class.php:21
actionadmin_enqueue_scriptsincludes\admin_page_edit_class.php:22
actionadmin_noticesincludes\admin_page_edit_class.php:23
actionsave_postincludes\core_controller_class.php:18
actionsave_postincludes\core_controller_class.php:59
actioninittied-pages.php:37
actionenqueue_block_editor_assetstied-pages.php:38
Maintenance & Trust

Tied Pages Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedApr 27, 2021
PHP min version7.3
Downloads828

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Tied Pages Developer Profile

Picture-Planet GmbH

2 plugins · 100 total installs

81
trust score
Avg Security Score
90/100
Avg Patch Time
38 days
View full developer profile
Detection Fingerprints

How We Detect Tied Pages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Tied Pages