ACF: Rus-To-Lat Security & Risk Analysis

wordpress.org/plugins/acf-rus-to-lat

Advanced Custom Fields (ACF): очищает имена дополнительных полей от ненужных символов и преобразует в латынь.

2K active installs v2.0.0 PHP 5.2.4+ WP 4.0+ Updated Nov 19, 2018
acfaddoncyrillicl10nlatin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ACF: Rus-To-Lat Safe to Use in 2026?

Generally Safe

Score 85/100

ACF: Rus-To-Lat has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "acf-rus-to-lat" v2.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. The plugin has a zero attack surface, meaning there are no exposed AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code signals indicate a strong adherence to secure coding practices, with no dangerous functions, no raw SQL queries, and no external HTTP requests. The presence of nonce checks is also a good sign for data integrity. However, a notable concern is the relatively low percentage of properly escaped output (43%). This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled correctly before being displayed to the user.

The vulnerability history is clean, with no recorded CVEs. This, combined with the lack of critical or high-severity taint flows and a small attack surface, suggests that the plugin is currently not a known target for significant exploits. The absence of bundled libraries also removes a potential avenue for vulnerabilities from outdated third-party code. Despite the lack of direct vulnerabilities identified in the analysis, the unescaped output remains a potential weak point that could be exploited under certain conditions.

In conclusion, the "acf-rus-to-lat" v2.0.0 plugin demonstrates strengths in its minimal attack surface and lack of known vulnerabilities. However, the unescaped output presents a tangible risk that should be addressed to further strengthen its security. Continued vigilance and regular security audits are recommended, especially as the plugin evolves.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

ACF: Rus-To-Lat Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF: Rus-To-Lat Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
6 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped14 total outputs
Attack Surface

ACF: Rus-To-Lat Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionacf/field_group/admin_enqueue_scriptsacf-rus-to-lat.php:22
actionadmin_footeracf-rus-to-lat.php:39
actionwp_loadedadmin-notices.php:148
actionadmin_footeradmin-notices.php:172
actionadmin_noticesadmin-notices.php:173
Maintenance & Trust

ACF: Rus-To-Lat Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.0
Last updatedNov 19, 2018
PHP min version5.2.4
Downloads192K

Community Trust

Rating0/100
Number of ratings0
Active installs2K
Developer Profile

ACF: Rus-To-Lat Developer Profile

andreykashops

1 plugin · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF: Rus-To-Lat

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ACF: Rus-To-Lat