
WP Favorite Posts Extended Security & Risk Analysis
wordpress.org/plugins/wp-favorite-posts-extendedwp-favorite-posts, reading list, post list, post lists, lists Requires at least: 3.5 Tested up to: 4.0 Stable tag: 0.1 Based on plugin "WP Favor …
Is WP Favorite Posts Extended Safe to Use in 2026?
Generally Safe
Score 85/100WP Favorite Posts Extended has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp-favorite-posts-extended plugin v1.6.2 presents a mixed security posture. On the positive side, it demonstrates strong practices by not making external HTTP requests, not performing file operations, and utilizing prepared statements for all its SQL queries. The absence of known CVEs and a clean vulnerability history is also a significant strength, suggesting a generally well-maintained codebase.
However, the static analysis reveals several concerning areas. A critical weakness is the extremely low percentage (2%) of properly escaped output. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly in the browser without sufficient sanitization. Furthermore, the presence of two taint flows with unsanitized paths, while not rated as critical or high, warrants attention as it suggests potential pathways for malicious input to be processed insecurely. The lack of nonce checks, despite having only one entry point, is another oversight that could be exploited in conjunction with other vulnerabilities.
In conclusion, while the plugin avoids common pitfalls like raw SQL or unprotected AJAX endpoints, the significant output escaping deficiency and the identified taint flows pose a considerable risk. The clean vulnerability history is encouraging, but the current static analysis findings suggest immediate attention is needed to address potential XSS and insecure data handling. Improvements in output escaping are paramount to strengthening its security.
Key Concerns
- Low percentage of properly escaped output
- Taint flows with unsanitized paths detected
- No nonce checks implemented
WP Favorite Posts Extended Security Vulnerabilities
WP Favorite Posts Extended Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Favorite Posts Extended Attack Surface
Shortcodes 1
WordPress Hooks 9
Maintenance & Trust
WP Favorite Posts Extended Maintenance & Trust
Maintenance Signals
Community Trust
WP Favorite Posts Extended Alternatives
My Favorites
my-favorites
Save user's favorite posts and list them.
Jiali User Bookmarks
jiali-user-bookmarks
Let your visitors easily bookmark, save, or favorite posts! Lightweight, AJAX-powered plugin to boost user engagement and interactivity. 📑✨
Techvoot Favourites for WooCommerce
techvoot-favourites-for-woocommerce
Lets WooCommerce customers save products as Favourites for quick reordering, with admin tools to manage each user's saved products.
Favorites
favorites
Favorites for any post type. Easily add favoriting/liking, wishlists, or any other similar functionality using the developer-friendly API.
HivePress Favorites
hivepress-favorites
Allow users to keep a list of favorite listings.
WP Favorite Posts Extended Developer Profile
1 plugin · 20 total installs
How We Detect WP Favorite Posts Extended
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-favorite-posts-extended/css/wpfp-style.css/wp-content/plugins/wp-favorite-posts-extended/js/wpfp-script.js/wp-content/plugins/wp-favorite-posts-extended/i/loading.gif/wp-content/plugins/wp-favorite-posts-extended/i/add.png/wp-content/plugins/wp-favorite-posts-extended/i/remove.png/wp-content/plugins/wp-favorite-posts-extended/js/wpfp-script.jswp-favorite-posts-extended/css/wpfp-style.css?ver=wp-favorite-posts-extended/js/wpfp-script.js?ver=HTML / DOM Fingerprints
wpfp-spanwpfp-linkwpfp-widgetwpfp-most-favoritedwpfp-list-titledata-postiddata-actionwpfp_ajaxurl[wpfp-list-favorites][wpfp-most-favorited]