WP Post Signature Security & Risk Analysis

wordpress.org/plugins/wp-post-signature

This plugin allows you to append a signature after every post. Some variables can be used.

1K active installs v0.4.1 PHP + WP 3.0+ Updated Sep 16, 2021
post-signaturesignature
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEDec 31, 2025
Safety Verdict

Is WP Post Signature Safe to Use in 2026?

Use With Caution

Score 63/100

WP Post Signature has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Dec 31, 2025Updated 4yr ago
Risk Assessment

The "wp-post-signature" plugin v0.4.1 presents a mixed security posture. While it demonstrates some good practices, such as exclusively using prepared statements for SQL queries and including nonce and capability checks, significant concerns remain. The static analysis reveals a notable weakness in output escaping, with only 25% of outputs being properly handled. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website's content. The absence of any taint analysis flows might be misleading, as it doesn't necessarily confirm the absence of vulnerabilities, especially in conjunction with the low output escaping rate. The plugin's vulnerability history is a major red flag. The presence of one unpatched medium-severity CVE, identified as Cross-Site Scripting, is a critical concern. The fact that this vulnerability is marked as "currently unpatched" and the "last vulnerability" date is in the future suggests potential issues with maintenance or a reporting anomaly, but the core issue of an unpatched XSS vulnerability remains. This history indicates a pattern of security weaknesses that require immediate attention and patching.

Key Concerns

  • Unpatched CVE (Medium Severity)
  • Low percentage of properly escaped output
  • Zero taint flows analyzed is not definitive
Vulnerabilities
1

WP Post Signature Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-62124medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Post Signature <= 0.4.1 - Authenticated (Author+) Stored Cross-Site Scripting

Dec 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP Post Signature Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
3 escaped
Nonce Checks
1
Capability Checks
2
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped12 total outputs
Attack Surface

WP Post Signature Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterplugin_row_metawp-post-signature.php:208
filterthe_contentwp-post-signature.php:217
filterthe_excerptwp-post-signature.php:218
actionadmin_menuwp-post-signature.php:229
Maintenance & Trust

WP Post Signature Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 16, 2021
PHP min version
Downloads52K

Community Trust

Rating76/100
Number of ratings13
Active installs1K
Developer Profile

WP Post Signature Developer Profile

Soli

2 plugins · 1K total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Post Signature

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- SIGNATURE_MARK -->
FAQ

Frequently Asked Questions about WP Post Signature