WP Plain Text Post Security & Risk Analysis

wordpress.org/plugins/wp-plain-text-post

A simple plug-in to configure plain text post for user roles and post types.

10 active installs v1.0 PHP + WP 3.1+ Updated Aug 8, 2015
filterhtmlplainpostremove
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Plain Text Post Safe to Use in 2026?

Generally Safe

Score 85/100

WP Plain Text Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-plain-text-post" v1.0 plugin exhibits a very small attack surface, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events. This is a positive indicator for security, as it limits potential entry points for malicious actors. Furthermore, the code analysis shows no dangerous functions or external HTTP requests, and all SQL queries utilize prepared statements, which are good security practices. The absence of any recorded vulnerabilities, CVEs, or critical taint flows also suggests a historically secure plugin.

However, a significant concern arises from the output escaping analysis. With 3 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is outputted by the plugin without proper sanitization can be exploited to inject malicious scripts into the website. The lack of nonce and capability checks, while not directly tied to specific entry points in this analysis, could become a risk if new entry points are added or if existing code pathways are discovered that bypass these protections.

In conclusion, while the plugin has a minimal attack surface and avoids some common security pitfalls, the complete lack of output escaping is a critical weakness that needs immediate attention. The historical absence of vulnerabilities is a good sign, but it does not negate the present risk posed by unescaped output. Addressing the output escaping issue should be the top priority to improve the plugin's security posture.

Key Concerns

  • Unescaped output found
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

WP Plain Text Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Plain Text Post Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

WP Plain Text Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

WP Plain Text Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuwpplainpost.php:11
actionadmin_initwpplainpost.php:15
filtercontent_save_prewpplainpost.php:154
Maintenance & Trust

WP Plain Text Post Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedAug 8, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Plain Text Post Developer Profile

Thamizhchelvan

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Plain Text Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about WP Plain Text Post