WP-PostViews Plus Security & Risk Analysis

wordpress.org/plugins/wp-postviews-plus

Enables You To Display How Many Times A Post Had Been Viewed By User Or Bot.

400 active installs v2.1.2 PHP 5.6.20+ WP 5.0+ Updated May 8, 2020
botcounterhitspostviewsviews
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-PostViews Plus Safe to Use in 2026?

Generally Safe

Score 85/100

WP-PostViews Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The wp-postviews-plus plugin version 2.1.2 exhibits a concerning security posture, primarily due to its significant attack surface without adequate authentication and a lack of robust code hardening practices. The static analysis reveals two AJAX handlers, both of which lack authorization checks, presenting a direct entry point for potential attackers. Furthermore, the plugin performs 13 SQL queries, none of which utilize prepared statements, indicating a high risk of SQL injection vulnerabilities. The output escaping is also a weakness, with only 34% of outputs properly escaped, increasing the likelihood of Cross-Site Scripting (XSS) attacks.

The taint analysis highlights four high-severity flows with unsanitized paths, which, when combined with the unprotected AJAX endpoints and unescaped output, strongly suggest that attackers could potentially manipulate data or execute malicious code. The complete absence of nonce checks and capability checks on its entry points further exacerbates these risks, allowing unauthenticated or unauthorized users to interact with sensitive functionalities. While the plugin has no recorded vulnerability history (CVEs), this absence does not guarantee future security and should not be relied upon as an indicator of its current strength, especially given the identified code weaknesses.

In conclusion, despite the lack of historical vulnerabilities, the current static and taint analysis of wp-postviews-plus v2.1.2 reveals significant security weaknesses. The unprotected AJAX endpoints, unescaped outputs, raw SQL queries, and high-severity taint flows represent immediate risks that require urgent attention. The plugin's security posture is compromised by the lack of fundamental security controls.

Key Concerns

  • 2 AJAX handlers without auth checks
  • 13 SQL queries, 0% using prepared statements
  • 34% properly escaped outputs
  • 4 High severity taint flows
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

WP-PostViews Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-PostViews Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
13
0 prepared
Unescaped Output
93
48 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared13 total queries

Output Escaping

34% escaped141 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

6 flows6 with unsanitized paths
wp_footer (class.wp-pvp.template.php:40)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

WP-PostViews Plus Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_wp_pvp_countclass.wp-pvp.ajax.php:13
noprivwp_ajax_wp_pvp_countclass.wp-pvp.ajax.php:14
WordPress Hooks 8
filterplugin_action_linksclass.wp-pvp.admin.php:15
actionadmin_menuclass.wp-pvp.admin.php:16
actionadmin_initclass.wp-pvp.admin.php:17
actiondelete_postclass.wp-pvp.php:54
actionwp_headclass.wp-pvp.template.php:14
actionwp_footerclass.wp-pvp.template.php:33
actioninitwp-postviews-plus.php:28
actionwidgets_initwp-postviews-plus.php:29
Maintenance & Trust

WP-PostViews Plus Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 8, 2020
PHP min version5.6.20
Downloads107K

Community Trust

Rating100/100
Number of ratings3
Active installs400
Developer Profile

WP-PostViews Plus Developer Profile

Richer Yang

5 plugins · 8K total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-PostViews Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-postviews-plus/wp-postviews-plus.php/wp-content/plugins/wp-postviews-plus/class.wp-pvp.php/wp-content/plugins/wp-postviews-plus/class.wp-pvp.widget.php/wp-content/plugins/wp-postviews-plus/class.wp-pvp.template.php/wp-content/plugins/wp-postviews-plus/function.wp-pvp.template.php

HTML / DOM Fingerprints

CSS Classes
wppvp_tuv_wppvp_tbv_wppvp_tv_
HTML Comments
<!-- Start Generated By WP-PostViews Plus --><!-- End Generated WP-PostViews Plus -->
REST Endpoints
/wp-admin/admin-ajax.php
FAQ

Frequently Asked Questions about WP-PostViews Plus