WP Dropdown Posts Security & Risk Analysis

wordpress.org/plugins/wp-dropdown-posts

This plugin will show post list as dropdown

10 active installs v0.2 PHP + WP + Updated Apr 14, 2010
dropdownjumpmenupost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Dropdown Posts Safe to Use in 2026?

Generally Safe

Score 85/100

WP Dropdown Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "wp-dropdown-posts" v0.2 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant positive indicator. Furthermore, the code signals reveal a diligent use of prepared statements for all SQL queries and a high percentage of properly escaped output, suggesting good development practices for preventing common vulnerabilities like SQL injection and XSS. The lack of file operations and external HTTP requests also reduces the attack surface. The vulnerability history, with zero recorded CVEs, further reinforces this positive assessment.

However, a notable concern arises from the complete absence of nonce checks and capability checks. While the current entry points might not present an immediate risk, this omission signifies a lack of fundamental security mechanisms that could be exploited if new entry points are introduced or if existing ones are discovered to be vulnerable in the future. The lack of taint analysis results is also a limitation, as it prevents a deeper understanding of potential data flow vulnerabilities. Despite these concerns, the current version appears relatively secure due to its limited attack surface and strong adherence to secure coding practices for its existing functionalities.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Dropdown Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Dropdown Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
10 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared10 total queries

Output Escaping

80% escaped5 total outputs
Attack Surface

WP Dropdown Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headwp-dropdown-posts.php:305
Maintenance & Trust

WP Dropdown Posts Maintenance & Trust

Maintenance Signals

WordPress version tested0.2
Last updatedApr 14, 2010
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Dropdown Posts Developer Profile

takien

6 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Dropdown Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-dropdown-posts/wp_dropdown_posts.css/wp-content/plugins/wp-dropdown-posts/wp_dropdown_posts.js
Script Paths
/wp-content/plugins/wp-dropdown-posts/wp_dropdown_posts.js
Version Parameters
wp-dropdown-posts/wp_dropdown_posts.css?ver=wp-dropdown-posts/wp_dropdown_posts.js?ver=

HTML / DOM Fingerprints

CSS Classes
level-wp-dropdown-posts
HTML Comments
<!-- cut long title -->
Data Attributes
onchange="javascript:dropdown_post_js(this)"
JS Globals
dropdown_post_js
FAQ

Frequently Asked Questions about WP Dropdown Posts