WP Post Limiter Security & Risk Analysis

wordpress.org/plugins/wp-post-limiter

Restrict the number of possible posts for a Wordpress user.

10 active installs v1.0 PHP + WP 3.0.5+ Updated Feb 18, 2011
limit-postsmaximum-postsrestrict-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Post Limiter Safe to Use in 2026?

Generally Safe

Score 85/100

WP Post Limiter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The plugin 'wp-post-limiter' version 1.0 exhibits a generally positive security posture based on the provided static analysis. The absence of any discovered attack vectors such as AJAX handlers, REST API routes, shortcodes, or cron events, especially without authentication checks, is a significant strength. Furthermore, the lack of dangerous functions, file operations, external HTTP requests, and bundled libraries further reduces the potential for common exploitation methods. The taint analysis also shows no critical or high severity flows, indicating no obvious pathways for malicious data manipulation or code execution.

However, several areas present potential concerns. The sole SQL query is not being prepared, which is a significant risk for SQL injection vulnerabilities, especially if any part of that query is influenced by user input. The absence of output escaping for the two identified outputs means that any dynamic content rendered by the plugin could be susceptible to Cross-Site Scripting (XSS) attacks if that content is not properly sanitized beforehand. The complete lack of nonce and capability checks is also concerning, as it implies that actions performed by the plugin, if any were to exist, would not be protected against CSRF attacks or unauthorized access by less privileged users.

Considering the vulnerability history, the plugin has a clean slate with no recorded CVEs. This is a positive indicator, suggesting the developers may have good security practices. However, this also means there is limited historical data to draw broader conclusions about long-term security maintenance. The strengths lie in its limited attack surface and absence of critical vulnerabilities in taint analysis. The weaknesses are primarily the unescaped outputs and the un-prepared SQL query, which are common but addressable security flaws.

Key Concerns

  • Raw SQL without prepared statements
  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Post Limiter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Post Limiter Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

WP Post Limiter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filteradmin_initwp-post-limiter.php:119
actionadmin_menuwp-post-limiter.php:120
actionfavorite_actionswp-post-limiter.php:121
Maintenance & Trust

WP Post Limiter Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedFeb 18, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Post Limiter Developer Profile

s a

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Post Limiter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-post-limiter/style.css/wp-content/plugins/wp-post-limiter/script.js
Script Paths
/wp-content/plugins/wp-post-limiter/script.js
Version Parameters
wp-post-limiter/style.css?ver=wp-post-limiter/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapoptions
Data Attributes
name="saq_save"id="saq_save"name="default_limit"id="default_limit"
Shortcode Output
<p>Permission denied. Your account is limited toposts. Your personal Postcount:. <a href="javascript_void(0);" onclick="history.back()">Back...</a></p>
FAQ

Frequently Asked Questions about WP Post Limiter