VI: Include Post By Security & Risk Analysis

wordpress.org/plugins/vi-include-post-by

Shortcodes allowing you to display posts inside other posts/pages

10 active installs v0.4.200706 PHP 5.2.4+ WP 4.0+ Updated Jul 27, 2020
optionsparamspostshortcodevars
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is VI: Include Post By Safe to Use in 2026?

Generally Safe

Score 85/100

VI: Include Post By has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "vi-include-post-by" v0.4.200706 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries are excellent security practices. Furthermore, the analysis indicates no critical or high-severity taint flows, suggesting that data handling within the plugin is likely secure. The plugin also has a clean vulnerability history with no recorded CVEs, which further reinforces its current security standing.

However, there are a few areas that warrant attention. The plugin relies solely on its entry points (shortcodes) and does not implement any capability checks or nonce checks. While the static analysis found no unprotected entry points, this lack of explicit authorization mechanisms could be a concern if the shortcode functionality were to evolve or if specific user roles were intended to be restricted from using it. Additionally, while 72% output escaping is good, the remaining 28% of outputs that are not properly escaped could potentially lead to cross-site scripting (XSS) vulnerabilities if untrusted user input is ever processed and displayed without proper sanitization.

In conclusion, "vi-include-post-by" v0.4.200706 is generally well-secured, demonstrating good coding practices in critical areas like SQL and taint handling, and having no known vulnerabilities. The primary areas for improvement would be the implementation of capability checks for its shortcodes and ensuring 100% output escaping to mitigate any potential XSS risks, however minor they may appear based on the current analysis.

Key Concerns

  • Missing capability checks on entry points
  • Unescaped output detected (28%)
Vulnerabilities
None known

VI: Include Post By Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

VI: Include Post By Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
36 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

72% escaped50 total outputs
Attack Surface

VI: Include Post By Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[include-post-by-id] vi_include_post_by.php:920
[include-post-by-cat] vi_include_post_by.php:921
WordPress Hooks 1
actionwp_enqueue_scriptsvi_include_post_by.php:925
Maintenance & Trust

VI: Include Post By Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJul 27, 2020
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

VI: Include Post By Developer Profile

Knighthawk

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VI: Include Post By

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vi-include-post-by/style.css/wp-content/plugins/vi-include-post-by/common.js
Script Paths
/wp-content/plugins/vi-include-post-by/common.js
Version Parameters
vi-include-post-by/style.css?ver=vi-include-post-by/common.js?ver=

HTML / DOM Fingerprints

CSS Classes
post-thumbnailaspect-ratio
Data Attributes
data-post_iddata-post_typedata-post_termdata-post_authordata-post_offsetdata-post_limit+7 more
JS Globals
vi_ipb_params
Shortcode Output
<div class="post-thumbnail aspect-ratio<h2 class="entry-title"><a href=alt="thumbnail for
FAQ

Frequently Asked Questions about VI: Include Post By