
Category Dropdown by GCS Design Security & Risk Analysis
wordpress.org/plugins/wp-category-dropdownDisplay a parent and child categories in a dropdown. Works with custom taxonomies and WooCommerce product categories.
Is Category Dropdown by GCS Design Safe to Use in 2026?
Use With Caution
Score 69/100Category Dropdown by GCS Design has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The "wp-category-dropdown" v1.9 plugin presents a concerning security posture, largely due to a significant number of unprotected entry points. The static analysis reveals 8 out of 9 total entry points, specifically AJAX handlers, lack authentication checks. This creates a wide attack surface that could be exploited by unauthenticated users. While the plugin demonstrates good practices in its use of prepared statements for SQL queries and an absence of file operations or external HTTP requests, the output escaping is poor, with only 27% of outputs properly escaped. This, combined with taint analysis showing flows with unsanitized paths, strongly suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities.
The vulnerability history further exacerbates these concerns. The plugin has two known CVEs, with one currently unpatched, both rated as medium severity and identified as Cross-Site Scripting issues. This pattern indicates a recurring problem with input sanitization and output escaping, reinforcing the risks identified in the static analysis. The recent nature of the last vulnerability (2025-09-22) is also a red flag. In conclusion, while the plugin has some strengths in its SQL handling, the numerous unprotected AJAX endpoints, poor output escaping, and a history of XSS vulnerabilities make it a high-risk plugin that requires immediate attention and patching.
Key Concerns
- 8 unprotected AJAX handlers
- 27% output escaping is proper
- Unpatched CVE (medium severity)
- 2 flows with unsanitized paths
- 0 nonce checks
- 0 capability checks
Category Dropdown by GCS Design Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
WP Category Dropdown <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting
WP Category Dropdown <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via align Parameter
Category Dropdown by GCS Design Code Analysis
Output Escaping
Data Flow Analysis
Category Dropdown by GCS Design Attack Surface
AJAX Handlers 8
Shortcodes 1
WordPress Hooks 4
Maintenance & Trust
Category Dropdown by GCS Design Maintenance & Trust
Maintenance Signals
Community Trust
Category Dropdown by GCS Design Alternatives
No alternatives data available yet.
Category Dropdown by GCS Design Developer Profile
1 plugin · 1K total installs
How We Detect Category Dropdown by GCS Design
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-category-dropdown/build/index.asset.php/wp-content/plugins/wp-category-dropdown/build/index.js/wp-content/plugins/wp-category-dropdown/js/scripts.jswp-content/plugins/wp-category-dropdown/build/index.jswp-content/plugins/wp-category-dropdown/js/scripts.jswp-category-dropdown/build/index.asset.php?ver=wp-category-dropdown/build/index.js?ver=wp-category-dropdown/js/scripts.jsHTML / DOM Fingerprints
wpcd_dropdown_categorieswpcd_child_cat_loaderwpcd_child_cat_dropdownid="wpcd_parent"id="child_cat_default_text"id="taxonomy"id="random_id"id="hide_empty"id="show_count"+4 morewpcdajax[wpcd_child_categories_dropdown]