Views Counter – Pages/Posts Security & Risk Analysis

wordpress.org/plugins/views-counter

Simple Plugin for showing the post or page view on Admin Column.no need to add code to theme file.just activate the plugin and enjoy.

50 active installs v1.0 PHP + WP + Updated Dec 15, 2017
admin-column-post-countercounterhitspost-counterpost-views
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Views Counter – Pages/Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Views Counter – Pages/Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "views-counter" plugin version 1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals show a positive absence of dangerous functions, file operations, and external HTTP requests. Crucially, all SQL queries are properly prepared, and there are no recorded vulnerabilities or CVEs for this plugin. This indicates a well-developed and secure plugin in its current version.

However, a significant concern arises from the output escaping analysis. With one total output and 0% properly escaped, there is a high likelihood of cross-site scripting (XSS) vulnerabilities. Any data displayed to users that originates from user input or is not properly sanitized before output could be exploited. The lack of nonce and capability checks, while not directly identified as exploitable given the limited attack surface, is a missed opportunity for robust security and could become a concern if the plugin's functionality expands in the future. The absence of taint analysis results is also notable, though this may simply mean no concerning flows were detected or the analysis was limited.

In conclusion, while the plugin benefits from a minimal attack surface and good practices in areas like SQL handling and vulnerability history, the critical flaw in output escaping presents a substantial risk. This needs to be addressed immediately to prevent potential XSS attacks. The lack of checks, while not currently a direct vulnerability, suggests a need for more defensive programming practices as the plugin evolves.

Key Concerns

  • Output escaping is not implemented
Vulnerabilities
None known

Views Counter – Pages/Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Views Counter – Pages/Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Views Counter – Pages/Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filtermanage_posts_columnsview-count.php:64
actionmanage_posts_custom_columnview-count.php:65
filtermanage_pages_columnsview-count.php:67
actionmanage_pages_custom_columnview-count.php:68
actionloop_startview-count.php:86
Maintenance & Trust

Views Counter – Pages/Posts Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 15, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

Views Counter – Pages/Posts Developer Profile

Akhtarujjaman Shuvo

10 plugins · 7K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
117 days
View full developer profile
Detection Fingerprints

How We Detect Views Counter – Pages/Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Views Counter – Pages/Posts