Top 10 Posts Security & Risk Analysis

wordpress.org/plugins/top-10-posts

Show a top 10 list from your popular blog posts easily.

20 active installs v1.2 PHP + WP 4.0+ Updated Nov 19, 2019
poststop-10top-10-listtop-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Top 10 Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Top 10 Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "top-10-posts" plugin version 1.2 exhibits a mixed security posture. On the positive side, there are no identified critical or high severity vulnerabilities in its history, and the static analysis reveals a very small attack surface with no directly exposed entry points without authentication checks. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests suggests a cautious approach to potentially risky coding practices.

However, significant concerns arise from the code analysis. The plugin's single SQL query is not using prepared statements, which is a direct pathway to SQL injection vulnerabilities, especially when combined with the complete lack of output escaping. Every output point is unescaped, creating a high risk of Cross-Site Scripting (XSS) attacks. The absence of nonce checks on its single shortcode entry point also presents an avenue for cross-site request forgery (CSRF) if the shortcode performs any state-changing actions. The lack of any capability checks further exacerbates these risks, meaning any logged-in user, regardless of their role, could potentially trigger these vulnerabilities.

Given the clean vulnerability history, it's possible these issues haven't been exploited yet, or the plugin's functionality is limited, thus not triggering exploitable scenarios. Nevertheless, the presence of unescaped output and unsanitized SQL queries, coupled with a lack of authorization checks on its entry point, represents a substantial security risk that should be addressed immediately. The strengths lie in its limited attack surface and lack of historical exploits, but the weaknesses in fundamental security practices are severe.

Key Concerns

  • SQL queries not using prepared statements
  • 0% of outputs properly escaped
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

Top 10 Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Top 10 Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

Top 10 Posts Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[top10posts] top-10-posts.php:28
Maintenance & Trust

Top 10 Posts Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedNov 19, 2019
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Top 10 Posts Developer Profile

Marcos Rezende

6 plugins · 180 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Top 10 Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/top-10-posts/images/donate.jpg/wp-content/plugins/top-10-posts/images/pagseguro.jpg/wp-content/plugins/top-10-posts/images/twitter.jpg

HTML / DOM Fingerprints

CSS Classes
wrap
Shortcode Output
<ul><li><a href=''></a></li></ul></p>
FAQ

Frequently Asked Questions about Top 10 Posts