Post Template Security & Risk Analysis

wordpress.org/plugins/wp-post-template

Get the Beauty of Your Webpages in Your Posts Too

500 active installs v1.0 PHP + WP 3.0+ Updated Dec 10, 2012
custom-post-templatecustom-templatepost-templatetemplatewp-post-template
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Template Safe to Use in 2026?

Generally Safe

Score 85/100

Post Template has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "wp-post-template" plugin v1.0 demonstrates a strong adherence to several security best practices, particularly in its handling of SQL queries and the absence of known vulnerabilities. The plugin utilizes prepared statements exclusively for its SQL operations, significantly mitigating the risk of SQL injection attacks. Furthermore, the lack of any recorded CVEs and a clean vulnerability history suggest a well-maintained and secure codebase. The static analysis also reveals a minimal attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or capability checks. Taint analysis further reinforces this positive security posture, showing no critical or high-severity flows with unsanitized paths.

However, a significant concern arises from the output escaping. With two total outputs identified, and 0% properly escaped, this presents a notable risk. Any dynamic data rendered directly to the user without proper sanitization can be exploited for Cross-Site Scripting (XSS) attacks. While the plugin's attack surface is small and it has no historical vulnerabilities, this lack of output escaping is a critical oversight. The absence of nonce checks and capability checks on any potential, albeit currently non-existent, entry points could also be a concern if the plugin were to evolve and expose new functionalities without proper security controls. In conclusion, while the plugin is robust in its SQL handling and has no known vulnerabilities, the critical flaw in output escaping necessitates immediate attention to prevent XSS vulnerabilities.

Key Concerns

  • All outputs are unescaped, leading to XSS risk
Vulnerabilities
None known

Post Template Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Template Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Post Template Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initinic-post-template.php:22
actionsave_postinic-post-template.php:23
filtersingle_templateinic-post-template.php:24
Maintenance & Trust

Post Template Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedDec 10, 2012
PHP min version
Downloads23K

Community Trust

Rating98/100
Number of ratings13
Active installs500
Developer Profile

Post Template Developer Profile

IndiaNIC

1 plugin · 500 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Template

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="inic_post_templates"id="inic_post_templates"name="inic_post_templates_present"
Shortcode Output
<input type="hidden" name="inic_post_templates_present" value="1" /><select name="inic_post_templates" id="inic_post_templates"><option value="default">Default Template</option><p>This themes have custom templates you can use for certain posts that might have additional features or custom layouts.</p><p>This theme has no available custom templates</p>
FAQ

Frequently Asked Questions about Post Template