WP Favorite Posts Extended Security & Risk Analysis

wordpress.org/plugins/wp-favorite-posts-extended

wp-favorite-posts, reading list, post list, post lists, lists Requires at least: 3.5 Tested up to: 4.0 Stable tag: 0.1 Based on plugin "WP Favor …

20 active installs v1.6.2 PHP + WP + Updated Nov 6, 2014
favoritefavorite-postsfavoritesfavouriteposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Favorite Posts Extended Safe to Use in 2026?

Generally Safe

Score 85/100

WP Favorite Posts Extended has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-favorite-posts-extended plugin v1.6.2 presents a mixed security posture. On the positive side, it demonstrates strong practices by not making external HTTP requests, not performing file operations, and utilizing prepared statements for all its SQL queries. The absence of known CVEs and a clean vulnerability history is also a significant strength, suggesting a generally well-maintained codebase.

However, the static analysis reveals several concerning areas. A critical weakness is the extremely low percentage (2%) of properly escaped output. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly in the browser without sufficient sanitization. Furthermore, the presence of two taint flows with unsanitized paths, while not rated as critical or high, warrants attention as it suggests potential pathways for malicious input to be processed insecurely. The lack of nonce checks, despite having only one entry point, is another oversight that could be exploited in conjunction with other vulnerabilities.

In conclusion, while the plugin avoids common pitfalls like raw SQL or unprotected AJAX endpoints, the significant output escaping deficiency and the identified taint flows pose a considerable risk. The clean vulnerability history is encouraging, but the current static analysis findings suggest immediate attention is needed to address potential XSS and insecure data handling. Improvements in output escaping are paramount to strengthening its security.

Key Concerns

  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths detected
  • No nonce checks implemented
Vulnerabilities
None known

WP Favorite Posts Extended Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Favorite Posts Extended Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
41
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

2% escaped42 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wpfp_die_or_go (wp-favorite-posts.php:106)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Favorite Posts Extended Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp-favorite-posts] wp-favorite-posts.php:315
WordPress Hooks 9
actionwp_loadedwp-favorite-posts.php:55
filterthe_contentwp-favorite-posts.php:310
actionwp_print_scriptswp-favorite-posts.php:322
actionwp_print_styleswp-favorite-posts.php:328
actionactivate_wp-favorite-posts/wp-favorite-posts.phpwp-favorite-posts.php:355
actionadmin_menuwp-favorite-posts.php:363
filterjson_api_controllerswp-favorite-posts.php:477
filterjson_api_wpfp_controller_pathwp-favorite-posts.php:485
actionwidgets_initwpfp-widgets.php:97
Maintenance & Trust

WP Favorite Posts Extended Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedNov 6, 2014
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings1
Active installs20
Developer Profile

WP Favorite Posts Extended Developer Profile

avrilmaomao

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Favorite Posts Extended

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-favorite-posts-extended/css/wpfp-style.css/wp-content/plugins/wp-favorite-posts-extended/js/wpfp-script.js/wp-content/plugins/wp-favorite-posts-extended/i/loading.gif/wp-content/plugins/wp-favorite-posts-extended/i/add.png/wp-content/plugins/wp-favorite-posts-extended/i/remove.png
Script Paths
/wp-content/plugins/wp-favorite-posts-extended/js/wpfp-script.js
Version Parameters
wp-favorite-posts-extended/css/wpfp-style.css?ver=wp-favorite-posts-extended/js/wpfp-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpfp-spanwpfp-linkwpfp-widgetwpfp-most-favoritedwpfp-list-title
Data Attributes
data-postiddata-action
JS Globals
wpfp_ajaxurl
Shortcode Output
[wpfp-list-favorites][wpfp-most-favorited]
FAQ

Frequently Asked Questions about WP Favorite Posts Extended