
WP-PostViews Plus Security & Risk Analysis
wordpress.org/plugins/wp-postviews-plusEnables You To Display How Many Times A Post Had Been Viewed By User Or Bot.
Is WP-PostViews Plus Safe to Use in 2026?
Generally Safe
Score 85/100WP-PostViews Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp-postviews-plus plugin version 2.1.2 exhibits a concerning security posture, primarily due to its significant attack surface without adequate authentication and a lack of robust code hardening practices. The static analysis reveals two AJAX handlers, both of which lack authorization checks, presenting a direct entry point for potential attackers. Furthermore, the plugin performs 13 SQL queries, none of which utilize prepared statements, indicating a high risk of SQL injection vulnerabilities. The output escaping is also a weakness, with only 34% of outputs properly escaped, increasing the likelihood of Cross-Site Scripting (XSS) attacks.
The taint analysis highlights four high-severity flows with unsanitized paths, which, when combined with the unprotected AJAX endpoints and unescaped output, strongly suggest that attackers could potentially manipulate data or execute malicious code. The complete absence of nonce checks and capability checks on its entry points further exacerbates these risks, allowing unauthenticated or unauthorized users to interact with sensitive functionalities. While the plugin has no recorded vulnerability history (CVEs), this absence does not guarantee future security and should not be relied upon as an indicator of its current strength, especially given the identified code weaknesses.
In conclusion, despite the lack of historical vulnerabilities, the current static and taint analysis of wp-postviews-plus v2.1.2 reveals significant security weaknesses. The unprotected AJAX endpoints, unescaped outputs, raw SQL queries, and high-severity taint flows represent immediate risks that require urgent attention. The plugin's security posture is compromised by the lack of fundamental security controls.
Key Concerns
- 2 AJAX handlers without auth checks
- 13 SQL queries, 0% using prepared statements
- 34% properly escaped outputs
- 4 High severity taint flows
- 0 Nonce checks
- 0 Capability checks
WP-PostViews Plus Security Vulnerabilities
WP-PostViews Plus Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
WP-PostViews Plus Attack Surface
AJAX Handlers 2
WordPress Hooks 8
Maintenance & Trust
WP-PostViews Plus Maintenance & Trust
Maintenance Signals
Community Trust
WP-PostViews Plus Alternatives
WP-PostViews Plus widget
wp-postviews-plus-widget
This is a widget based on WP-PostViews Plus plugin by Richer Yang (http://wordpress.org/extend/plugins/wp-postviews-plus).
WP-PostViews
wp-postviews
Enables you to display how many times a post/page had been viewed.
Post Views Stats Counter
post-views-stats-counter
This plugin will display how many times post and page viewed. It shows total view of access per day, week, month, and all days.
Easy Post View Counter
easy-post-view-counter
With this plugin you can see how many views a single post has.
myCred for WP-PostViews
mycred-for-wp-postviews
📢🚨 Important Notice: myCred for WP-PostViews is now part of the myCred Toolkit and will no longer receive updates here. Only security fixes will be pr …
WP-PostViews Plus Developer Profile
5 plugins · 8K total installs
How We Detect WP-PostViews Plus
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-postviews-plus/wp-postviews-plus.php/wp-content/plugins/wp-postviews-plus/class.wp-pvp.php/wp-content/plugins/wp-postviews-plus/class.wp-pvp.widget.php/wp-content/plugins/wp-postviews-plus/class.wp-pvp.template.php/wp-content/plugins/wp-postviews-plus/function.wp-pvp.template.phpHTML / DOM Fingerprints
wppvp_tuv_wppvp_tbv_wppvp_tv_<!-- Start Generated By WP-PostViews Plus --><!-- End Generated WP-PostViews Plus -->/wp-admin/admin-ajax.php