
TomS Pretty List Security & Risk Analysis
wordpress.org/plugins/toms-pretty-listTomS Pretty List block is a feature list block that help you easily to make a beautiful list. Support Font icon and Svg icon.
Is TomS Pretty List Safe to Use in 2026?
Generally Safe
Score 100/100TomS Pretty List has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The security posture of the 'toms-pretty-list' plugin v1.0.2 appears to be a mixed bag, exhibiting some good practices alongside significant areas of concern. On the positive side, the plugin demonstrates excellent SQL hygiene by exclusively using prepared statements and has no recorded vulnerability history, suggesting a generally stable codebase. The absence of file operations and external HTTP requests further reduces the potential attack surface. However, the static analysis reveals a critical weakness: 100% of its single output is not properly escaped.
This lack of output escaping is a significant risk, as it can lead to cross-site scripting (XSS) vulnerabilities. Any dynamic data rendered by the plugin that is not properly sanitized before being displayed to the user could be exploited by attackers to inject malicious scripts. Furthermore, the absence of any identified entry points like AJAX handlers, REST API routes, or shortcodes, while seemingly positive for reducing direct attack vectors, is also unusual and could indicate a limited functionality or potential for future development to introduce new, unhardened entry points. The lack of nonce and capability checks is also a concern, especially if any functionality is ever added that could be triggered by unauthenticated or unauthorized users.
Given the plugin's limited recorded history and the absence of known CVEs, it's difficult to draw strong conclusions about its long-term security trends. However, the current codebase's failure to properly escape output is a tangible and immediate risk that needs to be addressed. While the plugin excels in SQL and avoiding common external threats, the unescaped output represents a significant vulnerability that could undermine the overall security of a WordPress site.
Key Concerns
- 100% of outputs are not properly escaped
- No nonce checks present
- No capability checks present
TomS Pretty List Security Vulnerabilities
TomS Pretty List Code Analysis
Output Escaping
TomS Pretty List Attack Surface
WordPress Hooks 1
Maintenance & Trust
TomS Pretty List Maintenance & Trust
Maintenance Signals
Community Trust
TomS Pretty List Alternatives
Post List with Load More
post-list-with-load-more
Simple yet powerful WordPress plugin that allows you to display built-in/custom posts and pages anywhere on your website.
Custom post listing block
custom-post-listing-block
Display custom post listing block with details.
Classic Editor
classic-editor
Enables the previous "classic" editor and the old-style Edit Post screen with TinyMCE, Meta Boxes, etc. Supports all plugins that extend this screen.
Starter Templates – AI-Powered Templates for Elementor & Gutenberg
astra-sites
The growing library of 300+ ready-to-use templates that work with all WordPress themes including Astra, Hello, OceanWP, GeneratePress and more
Advanced Editor Tools
tinymce-advanced
Extends and enhances the block editor (Gutenberg) and the classic editor (TinyMCE).
TomS Pretty List Developer Profile
7 plugins · 1K total installs
How We Detect TomS Pretty List
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/toms-pretty-list/build/index.js/wp-content/plugins/toms-pretty-list/build/index.css/wp-content/plugins/toms-pretty-list/build/frontend.js/wp-content/plugins/toms-pretty-list/build/frontend.css/wp-content/plugins/toms-pretty-list/build/index.js/wp-content/plugins/toms-pretty-list/build/frontend.jstoms-pretty-list/build/index.js?ver=toms-pretty-list/build/index.css?ver=toms-pretty-list/build/frontend.js?ver=toms-pretty-list/build/frontend.css?ver=HTML / DOM Fingerprints
tomsneddontoms-pretty-list<div class="tomsneddon">
<div id="toms-pretty-list" class="toms-pretty-list">
<pre style="display: none; opacity: 0;">