WP Post ACL Security & Risk Analysis

wordpress.org/plugins/wp-post-acl

A simple way to control who can edit WordPress posts or pages.

10 active installs v1.0.1 PHP + WP 4.2+ Updated Jul 6, 2016
acleditpermissionspostrestrict
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Post ACL Safe to Use in 2026?

Generally Safe

Score 85/100

WP Post ACL has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The wp-post-acl v1.0.1 plugin exhibits a generally positive security posture, with no reported vulnerabilities or known CVEs. The absence of an attack surface through AJAX, REST API, shortcodes, and cron events is a significant strength. Furthermore, all SQL queries are confirmed to use prepared statements, which is a best practice that mitigates SQL injection risks. The presence of nonce and capability checks also indicates an effort to secure the plugin's functionalities.

However, the static analysis reveals a critical concern: the presence of the `unserialize()` function. While the taint analysis shows no current unsanitized flows, the use of `unserialize()` without proper input validation or sanitization is a known vector for remote code execution vulnerabilities. The fact that 100% of the identified outputs are not properly escaped also presents a risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website.

Given the lack of past vulnerabilities, it might suggest diligent maintenance or a low profile. Nevertheless, the identified code signals, particularly `unserialize()` and unescaped output, require immediate attention. The plugin's strengths in limiting attack vectors and using prepared statements are commendable, but these are overshadowed by the potential for severe security issues arising from the dangerous functions and unescaped outputs.

Key Concerns

  • Dangerous function: unserialize used
  • Output escaping: 0% properly escaped
Vulnerabilities
None known

WP Post ACL Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Post ACL Release Timeline

v1.0.1Current
Code Analysis
Analyzed Apr 16, 2026

WP Post ACL Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->post_types = defined('ACL_POST_TYPES') ? unserialize( ACL_POST_TYPES ) : [ 'post', 'page' ];wp-post-acl.php:47

Output Escaping

0% escaped2 total outputs
Attack Surface

WP Post ACL Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filteruser_has_capwp-post-acl.php:49
actionadd_meta_boxeswp-post-acl.php:51
actionsave_postwp-post-acl.php:52
actionplugins_loadedwp-post-acl.php:54
Maintenance & Trust

WP Post ACL Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedJul 6, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Post ACL Developer Profile

Viljami Kuosmanen

4 plugins · 240 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Post ACL

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
acl-list
Data Attributes
name="acl_users[]"name="wp_post_acl_meta_nonce"
FAQ

Frequently Asked Questions about WP Post ACL