AMS Post And Page Duplicator Security & Risk Analysis

wordpress.org/plugins/ams-post-and-page-duplicator

For creating copy of posts and pages.

700 active installs v1.1 PHP + WP 3.1+ Updated Jan 23, 2022
copydraftduplicateduplicate-pageduplicate-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AMS Post And Page Duplicator Safe to Use in 2026?

Generally Safe

Score 85/100

AMS Post And Page Duplicator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "ams-post-and-page-duplicator" v1.1 plugin exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, significantly reducing the potential attack surface. Crucially, all detected SQL queries utilize prepared statements, and all output is properly escaped, mitigating common web vulnerabilities like SQL injection and cross-site scripting. The presence of nonce and capability checks further reinforces its security design.

Taint analysis reveals no flows with unsanitized paths, indicating that user-supplied data is likely handled securely and not passed to sensitive functions without proper sanitization. The absence of file operations and external HTTP requests also removes potential avenues for attack. Furthermore, the plugin has no recorded vulnerability history, including no known CVEs, which is a positive indicator of its past security and maintenance.

Overall, the plugin demonstrates a commendable commitment to secure coding practices. The lack of identified vulnerabilities in both static analysis and historical data suggests it is currently a low-risk plugin. However, it's important to remember that static analysis is not exhaustive, and comprehensive security testing can uncover issues not detected by these methods. For now, the strengths in input validation, output escaping, and authentication checks far outweigh any potential concerns.

Vulnerabilities
None known

AMS Post And Page Duplicator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AMS Post And Page Duplicator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

4 flows
amspapdms_post_duplictor_edit_post_screen_link (includes\amspapd-post-and-page-duplictor-menu-and-post-links.php:33)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AMS Post And Page Duplicator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
filterpost_row_actionsincludes\amspapd-post-and-page-duplictor-menu-and-post-links.php:9
filterpage_row_actionsincludes\amspapd-post-and-page-duplictor-menu-and-post-links.php:10
actionpost_submitbox_misc_actionsincludes\amspapd-post-and-page-duplictor-menu-and-post-links.php:11
actionamspd_ms_post-duplicator_meta_fields_do_postincludes\amspapd-post-and-page-duplictor-post_meta_info.php:9
actionamspd_ms_post-duplicator_meta_fields_do_pageincludes\amspapd-post-and-page-duplictor-post_meta_info.php:10
actionamspd_ms_post-duplicator_taxonomy_do_postincludes\amspapd-post-and-page-duplictor-post_meta_info.php:11
actionamspd_ms_post-duplicator_taxonomy_do_pageincludes\amspapd-post-and-page-duplictor-post_meta_info.php:12
actionadmin_action_amspapdms_post_page_duplictor_copy_the_postincludes\amspapd-post-and-page-duplictor-setup.php:12
actionadmin_action_amspapdms_post_page_duplictor_copy_the_post_as_new_draftincludes\amspapd-post-and-page-duplictor-setup.php:13
Maintenance & Trust

AMS Post And Page Duplicator Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedJan 23, 2022
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs700
Developer Profile

AMS Post And Page Duplicator Developer Profile

Manoj

6 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AMS Post And Page Duplicator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ams-post-and-page-duplicator/assets/css/ams-post-and-page-duplicator.css/wp-content/plugins/ams-post-and-page-duplicator/assets/js/ams-post-and-page-duplicator.js
Script Paths
/wp-content/plugins/ams-post-and-page-duplicator/assets/js/ams-post-and-page-duplicator.js
Version Parameters
ams-post-and-page-duplicator/assets/css/ams-post-and-page-duplicator.css?ver=ams-post-and-page-duplicator/assets/js/ams-post-and-page-duplicator.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Copy the post and insert it --><!-- if you don't want current user to be the new post author, then change next couple of lines to this: $new_post_author = $post->post_author; --><!-- Copies meta info --><!-- Copy taxonomies -->+1 more
Data Attributes
data-id=""data-post_type=""data-nonce=""
JS Globals
amsapdms_post_and_page_duplicator
FAQ

Frequently Asked Questions about AMS Post And Page Duplicator