Ultimate Category Excluder Security & Risk Analysis

wordpress.org/plugins/ultimate-category-excluder

Ultimate Category Excluder allows you to quickly and easily exclude categories from your front page, archives, feeds, and search results.

50K active installs v1.7 PHP + WP 5.0+ Updated Dec 29, 2025
exclude-categoriesexclude-categoryhidden-categoryhide-categorieshide-category
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 8, 2020
Safety Verdict

Is Ultimate Category Excluder Safe to Use in 2026?

Generally Safe

Score 99/100

Ultimate Category Excluder has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 8, 2020Updated 3mo ago
Risk Assessment

The static analysis of 'ultimate-category-excluder' v1.7 indicates a relatively small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed without authentication. This suggests a generally good design principle in limiting entry points. However, the code analysis reveals significant concerns regarding data handling. Specifically, 100% of the SQL queries are not using prepared statements, and 100% of output is not properly escaped. This represents a critical weakness, as it opens the plugin to potential SQL injection and cross-site scripting (XSS) vulnerabilities, even if no specific taint flows were detected in this static analysis pass. The presence of a historical high-severity CVE, which was a Cross-Site Request Forgery (CSRF), further highlights past security oversights and suggests a pattern of vulnerabilities that, while potentially patched in older versions, indicates areas of past weakness in sanitization and protection against malicious input. While the plugin has a good defense in depth strategy by limiting direct entry points, the lack of secure coding practices in SQL and output handling presents a substantial risk.

Key Concerns

  • Raw SQL queries without prepared statements
  • Output not properly escaped
  • Historical high-severity CVE (CSRF)
Vulnerabilities
1

Ultimate Category Excluder Security Vulnerabilities

CVEs by Year

1 CVE in 2020
2020
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2020-35135high · 8.8Cross-Site Request Forgery (CSRF)

Ultimate Category Excluder <= 1.1 - Cross-Site Request Forgery

Jan 8, 2020 Patched in 1.2 (1476d)
Code Analysis
Analyzed Mar 16, 2026

Ultimate Category Excluder Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped9 total outputs
Attack Surface

Ultimate Category Excluder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuultimate-category-excluder.php:33
filterpre_get_postsultimate-category-excluder.php:34
actionxmlrpc_callultimate-category-excluder.php:39
actionrest_api_initultimate-category-excluder.php:40
Maintenance & Trust

Ultimate Category Excluder Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 29, 2025
PHP min version
Downloads549K

Community Trust

Rating84/100
Number of ratings77
Active installs50K
Developer Profile

Ultimate Category Excluder Developer Profile

Marios Alexandrou

7 plugins · 195K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
1456 days
View full developer profile
Detection Fingerprints

How We Detect Ultimate Category Excluder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapwidefat
Data Attributes
name="exclude_main[]"name="exclude_feed[]"name="exclude_archives[]"name="exclude_search[]"name="disable_for_api"id="disable_for_api"+1 more
FAQ

Frequently Asked Questions about Ultimate Category Excluder