xili Post in Post Security & Risk Analysis

wordpress.org/plugins/xili-postinpost

xili-postinpost provides a triple toolkit to insert post(s) everywhere in webpage. Template tag function, shortcode and widget are available.

70 active installs v1.7.02 PHP + WP 4.9+ Updated May 21, 2019
multilingualpagepostpoststheme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is xili Post in Post Safe to Use in 2026?

Generally Safe

Score 85/100

xili Post in Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The xili-postinpost plugin v1.7.02 exhibits a generally good security posture based on the provided static analysis. It has no recorded vulnerabilities, no dangerous functions used, and all SQL queries utilize prepared statements, which are strong indicators of secure coding practices. The presence of nonce and capability checks, along with a low number of entry points, further contributes to its secure foundation. However, a significant concern arises from the output escaping analysis, where only 57% of outputs are properly escaped. This means that a substantial portion of the plugin's output might be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not handled carefully within the unescaped portions of the code. While the attack surface is small and appears protected, the unescaped output represents a potential risk that warrants attention.

The lack of any recorded CVEs, unpatched vulnerabilities, or common vulnerability types in its history is a very positive sign. This suggests that the plugin has historically been maintained with security in mind, or has simply not been a target for significant exploits. Coupled with the absence of critical or high severity taint flows, this historical data reinforces the perception of a relatively safe plugin. However, the static analysis does highlight a weakness in output sanitization. The plugin's strengths lie in its foundational security practices like prepared SQL statements and the limited, authenticated attack surface. The main weakness is the potential for XSS vulnerabilities due to insufficient output escaping.

Key Concerns

  • Insufficient output escaping (57% proper)
Vulnerabilities
None known

xili Post in Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

xili Post in Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
78
102 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped180 total outputs
Attack Surface

xili Post in Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[xilipostinpost] xili-postinpost.php:142
WordPress Hooks 9
filterxili_post_in_post_crontabclass-xili-post-in-post-widget.php:33
actionwp_headclass-xili-postinpost.php:45
actionwidgets_initclass-xili-postinpost.php:46
actionadmin_menuclass-xili-postinpost.php:49
filterplugin_action_linksclass-xili-postinpost.php:50
actioncontextual_helpclass-xili-postinpost.php:51
actionadmin_headclass-xili-postinpost.php:52
actionadmin_print_footer_scriptsclass-xili-postinpost.php:118
actionadmin_print_footer_scriptsclass-xili-postinpost.php:132
Maintenance & Trust

xili Post in Post Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 21, 2019
PHP min version
Downloads11K

Community Trust

Rating90/100
Number of ratings4
Active installs70
Developer Profile

xili Post in Post Developer Profile

Michel - xiligroup dev

4 plugins · 2K total installs

66
trust score
Avg Security Score
69/100
Avg Patch Time
83 days
View full developer profile
Detection Fingerprints

How We Detect xili Post in Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/xili-postinpost/css/xili-postinpost.css/wp-content/plugins/xili-postinpost/js/xili-postinpost.js
Version Parameters
xili-postinpost/css/xili-postinpost.css?ver=xili-postinpost/js/xili-postinpost.js?ver=

HTML / DOM Fingerprints

CSS Classes
xi_postinpostxi_postinpost_titlexi_postinpost_excerptxi_postinpost_content
HTML Comments
---------- function post in post or everywhere ---------- 080629 101006 -----cache used in same page because query called more than one timesave current loopsave current pagination vars used in wp_link_pages+1 more
Data Attributes
data-moredata-featuredimagesizedata-featuredimageaslinkdata-featuredimagedata-nopostdata-lang+21 more
JS Globals
Xili_Postinpostxili_postinpost_widget
Shortcode Output
<div class="xi_postinpost"><h4 class="xi_postinpost_title"><object class="xi_postinpost_excerpt"><object class="xi_postinpost_content">
FAQ

Frequently Asked Questions about xili Post in Post