ACF Options For Polylang Security & Risk Analysis

wordpress.org/plugins/acf-options-for-polylang

Improves Polylang by adding per-language support for ACF options pages—each language can have its own option values.

10K active installs v2.0.0 PHP 7.4+ WP 6.0+ Updated Mar 4, 2026
acfoptionoptionsoptions-pagepolylang
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ACF Options For Polylang Safe to Use in 2026?

Generally Safe

Score 100/100

ACF Options For Polylang has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The static analysis of 'acf-options-for-polylang' v2.0.0 reveals a generally positive security posture, with no identified dangerous functions, SQL queries utilizing prepared statements, or file operations. The absence of external HTTP requests and bundled libraries is also a strength. However, there are areas for concern. The analysis indicates a significant lack of protective measures for identified entry points, with 0 AJAX handlers, REST API routes, shortcodes, and cron events, but crucially, all are unprotected as there are no capability checks or nonce checks present.

While taint analysis found no critical or high severity unsanitized flows, and there is no known vulnerability history for this plugin, the complete absence of nonce checks and capability checks on potential entry points is a significant weakness. The fact that there are no identified entry points might suggest the plugin doesn't actively expose these in v2.0.0, but the static analysis report indicates 0 unprotected entry points, which is contradictory and warrants further investigation. If any entry points were to be introduced or discovered in future versions, the lack of these fundamental security checks would expose the plugin to significant risks.

In conclusion, the plugin demonstrates good practices in handling data and avoiding common pitfalls like raw SQL. However, the complete lack of authentication and authorization checks on its (albeit seemingly non-existent) attack surface is a major concern. The reported zero unprotected entry points coupled with zero capability/nonce checks is confusing and suggests either a very limited plugin scope in this version or a potential misinterpretation by the analysis tools. Regardless, the lack of built-in defenses is a weakness that could be exploited if any new entry points emerge.

Key Concerns

  • No nonce checks found
  • No capability checks found
  • Output escaping is only 67% proper
Vulnerabilities
None known

ACF Options For Polylang Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF Options For Polylang Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

ACF Options For Polylang Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actioninitbea-acf-options-for-polylang.php:67
filteracf/options_page/submitbox_before_major_actionsclasses\admin.php:15
filteracf/validate_post_idclasses\main.php:20
filteracf/load_valueclasses\main.php:23
filteracf/settings/current_languageclasses\main.php:26
filteracf/load_valueclasses\main.php:29
filteracf/load_referenceclasses\main.php:32
filteracf/load_valueclasses\main.php:70
filteracf/load_valueclasses\main.php:71
filteracf/load_referenceclasses\main.php:120
filteracf/settings/current_languageclasses\main.php:206
filteracf/load_valueclasses\main.php:207
actionadmin_noticesclasses\requirements.php:34
actionadmin_initclasses\requirements.php:42
Maintenance & Trust

ACF Options For Polylang Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 4, 2026
PHP min version7.4
Downloads204K

Community Trust

Rating88/100
Number of ratings17
Active installs10K
Developer Profile

ACF Options For Polylang Developer Profile

Amaury Balmer

3 plugins · 10K total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF Options For Polylang

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-options-for-polylang/assets/css/back.css/wp-content/plugins/acf-options-for-polylang/assets/js/back.js
Script Paths
/wp-content/plugins/acf-options-for-polylang/assets/js/back.js
Version Parameters
acf-options-for-polylang/assets/css/back.css?ver=acf-options-for-polylang/assets/js/back.js?ver=

HTML / DOM Fingerprints

CSS Classes
acf-options-for-polylang-wrapperacf-options-for-polylang-content
HTML Comments
<!-- ACF Options for Polylang -->
Data Attributes
data-polylang-lang-attribute
JS Globals
BeaAcfOptionsForPolylang
Shortcode Output
[acf_options_for_polylang]
FAQ

Frequently Asked Questions about ACF Options For Polylang