LAPDI Featured Posts Security & Risk Analysis

wordpress.org/plugins/tsp-featured-posts

Featured Posts allows you to add featured posts to your blog's website via widgets, pages and/or posts.

70 active installs v1.3.3 PHP + WP 3.5.1+ Updated Feb 8, 2021
featured-posts-display-gallery-slider-jquery-moving-boxes-the-software-people
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LAPDI Featured Posts Safe to Use in 2026?

Generally Safe

Score 85/100

LAPDI Featured Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The tsp-featured-posts plugin v1.3.3 exhibits a generally good security posture, with no known vulnerabilities in its history and a limited attack surface. The static analysis reveals a clean codebase with no dangerous functions, file operations, or external HTTP requests. Importantly, all SQL queries are prepared, and nonce checks are present. However, a significant concern arises from the lack of output escaping. With 100% of outputs not being properly escaped, there is a high risk of cross-site scripting (XSS) vulnerabilities. While no taint flows were found, this could be due to the limited scope of the analysis or the absence of complex data manipulation within the plugin. The absence of capability checks for the shortcode, while not directly indicated as a vulnerability, is a missed opportunity for robust access control, especially if the shortcode's functionality is sensitive. The plugin's vulnerability history is a strong positive, suggesting robust development practices. Overall, the plugin is well-built in terms of preventing common vulnerabilities, but the unescaped output presents a critical area for immediate improvement to mitigate XSS risks.

Key Concerns

  • Output escaping missing
  • No capability checks on shortcode
Vulnerabilities
None known

LAPDI Featured Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LAPDI Featured Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

LAPDI Featured Posts Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[tsp_featured_posts] tsp-featured-posts.php:75
WordPress Hooks 1
actionwidgets_inittsp-featured-posts.php:80
Maintenance & Trust

LAPDI Featured Posts Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedFeb 8, 2021
PHP min version
Downloads20K

Community Trust

Rating100/100
Number of ratings6
Active installs70
Alternatives

LAPDI Featured Posts Alternatives

No alternatives data available yet.

Developer Profile

LAPDI Featured Posts Developer Profile

Sharron Denice

7 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LAPDI Featured Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tsp-featured-posts/assets/css/movingboxes.css/wp-content/plugins/tsp-featured-posts/assets/css/movingboxes-ie.css/wp-content/plugins/tsp-featured-posts/tsp-featured-posts.ie.css/wp-content/plugins/tsp-featured-posts/tsp-featured-posts.css/wp-content/plugins/tsp-featured-posts/assets/js/jquery.movingboxes.js/wp-content/plugins/tsp-featured-posts/assets/js/slider-scripts.js/wp-content/plugins/tsp-featured-posts/assets/js/scripts.js

HTML / DOM Fingerprints

CSS Classes
tspfp-featured-posts
Data Attributes
data-tspfp-options
JS Globals
tspfp
Shortcode Output
[tsp_featured_posts][featured_posts]
FAQ

Frequently Asked Questions about LAPDI Featured Posts