
VI: Include Post By Security & Risk Analysis
wordpress.org/plugins/vi-include-post-byShortcodes allowing you to display posts inside other posts/pages
Is VI: Include Post By Safe to Use in 2026?
Generally Safe
Score 85/100VI: Include Post By has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "vi-include-post-by" v0.4.200706 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries are excellent security practices. Furthermore, the analysis indicates no critical or high-severity taint flows, suggesting that data handling within the plugin is likely secure. The plugin also has a clean vulnerability history with no recorded CVEs, which further reinforces its current security standing.
However, there are a few areas that warrant attention. The plugin relies solely on its entry points (shortcodes) and does not implement any capability checks or nonce checks. While the static analysis found no unprotected entry points, this lack of explicit authorization mechanisms could be a concern if the shortcode functionality were to evolve or if specific user roles were intended to be restricted from using it. Additionally, while 72% output escaping is good, the remaining 28% of outputs that are not properly escaped could potentially lead to cross-site scripting (XSS) vulnerabilities if untrusted user input is ever processed and displayed without proper sanitization.
In conclusion, "vi-include-post-by" v0.4.200706 is generally well-secured, demonstrating good coding practices in critical areas like SQL and taint handling, and having no known vulnerabilities. The primary areas for improvement would be the implementation of capability checks for its shortcodes and ensuring 100% output escaping to mitigate any potential XSS risks, however minor they may appear based on the current analysis.
Key Concerns
- Missing capability checks on entry points
- Unescaped output detected (28%)
VI: Include Post By Security Vulnerabilities
VI: Include Post By Code Analysis
Output Escaping
VI: Include Post By Attack Surface
Shortcodes 2
WordPress Hooks 1
Maintenance & Trust
VI: Include Post By Maintenance & Trust
Maintenance Signals
Community Trust
VI: Include Post By Alternatives
GET Params
get-params
Shortcodes allowing you to display GET parameters from the current URL in pages and posts, or show/hide content depending on GET param values
Display URL Params
display-url-params
A simple shortcode to get URL parameters from the Query String and display them as dynamic content on pages, posts and forms.
Anything Shortcodes
anything-shortcodes
Retrieve and display any WordPress data with shortcodes — posts, users, options, and more, with flexible formatting and customization.
WP Shortcodes Plugin — Shortcodes Ultimate
shortcodes-ultimate
A comprehensive collection of visual components for your site
Display Posts – Easy lists, grids, navigation, and more
display-posts-shortcode
Add a listing of content on your website using a simple shortcode. Filter the results by category, author, and more.
VI: Include Post By Developer Profile
2 plugins · 20 total installs
How We Detect VI: Include Post By
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/vi-include-post-by/style.css/wp-content/plugins/vi-include-post-by/common.js/wp-content/plugins/vi-include-post-by/common.jsvi-include-post-by/style.css?ver=vi-include-post-by/common.js?ver=HTML / DOM Fingerprints
post-thumbnailaspect-ratiodata-post_iddata-post_typedata-post_termdata-post_authordata-post_offsetdata-post_limit+7 morevi_ipb_params<div class="post-thumbnail aspect-ratio<h2 class="entry-title"><a href=alt="thumbnail for