WP Jerusalem Post Security & Risk Analysis

wordpress.org/plugins/wp-jerusalem-post

Stable 1.0.0 Stable tag: trunk License: GPLv2 or later License URI: http://www.gnu.org/licenses/gpl-2.0.html

10 active installs v1.0.1 PHP + WP 3.3+ Updated Apr 7, 2016
feedisraeljerusalemjpostjpost-com
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Jerusalem Post Safe to Use in 2026?

Generally Safe

Score 85/100

WP Jerusalem Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "wp-jerusalem-post" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, and crucially, all identified entry points are reported as protected. Furthermore, the code signals reveal no dangerous functions, no raw SQL queries (all are prepared), and no file operations or external HTTP requests, which are all positive indicators. The plugin also does not bundle any libraries, removing a potential source of vulnerabilities.

However, a notable concern arises from the output escaping. With 25 total outputs and only 20% properly escaped, this indicates a potential for Cross-Site Scripting (XSS) vulnerabilities. While no taint analysis flows with unsanitized paths were found, the lack of comprehensive output escaping creates a risk where user-supplied data could be injected into the output without proper sanitization, leading to XSS attacks.

The vulnerability history is clean, with zero known CVEs. This, combined with the lack of identified issues in the code analysis (other than output escaping), suggests that the developers may be following good security practices. However, the lack of nonce checks and capability checks, while not directly leading to a deduction in this specific version due to the limited attack surface, would be significant concerns if the plugin's functionality were to expand and introduce more exposed entry points.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

WP Jerusalem Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Jerusalem Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped25 total outputs
Attack Surface

WP Jerusalem Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initwp-jerusalem-posts.php:35
actionwp_print_styleswp-jerusalem-posts.php:47
Maintenance & Trust

WP Jerusalem Post Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 7, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Jerusalem Post Developer Profile

Aaron Reimann

4 plugins · 10K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Jerusalem Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-jerusalem-post/style.css

HTML / DOM Fingerprints

CSS Classes
jerusalempost-feedjerusalempost-feed-jerusalempost-itemjerusalempost-item-
FAQ

Frequently Asked Questions about WP Jerusalem Post