
Atlas Content Modeler Security & Risk Analysis
wordpress.org/plugins/atlas-content-modelerA WordPress plugin to create custom post types, custom fields, and custom taxonomies for headless WordPress sites.
Is Atlas Content Modeler Safe to Use in 2026?
Generally Safe
Score 85/100Atlas Content Modeler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "atlas-content-modeler" v0.26.2 plugin exhibits a generally strong security posture based on the provided static analysis. A significant strength is the complete absence of vulnerabilities in its historical record, indicating a potentially well-maintained and secure codebase over time. Furthermore, the plugin demonstrates excellent practices regarding output escaping, with 100% of outputs properly escaped, and a high percentage (92%) of SQL queries utilizing prepared statements, which is crucial for preventing SQL injection. The attack surface is well-secured, with all entry points having appropriate authentication and permission checks in place.
However, a notable concern is the presence of the `shell_exec` function. While it is only one instance, the use of such a function can introduce significant security risks if not handled with extreme care, potentially allowing for remote code execution if user input is not rigorously sanitized. The taint analysis did not reveal any unsanitized paths, which is a positive sign that this specific function might be used in a controlled manner. The limited number of file operations and external HTTP requests also suggest a contained functionality, reducing potential attack vectors.
In conclusion, the plugin is largely secure with robust defenses against common web vulnerabilities. The only significant flag is the `shell_exec` function. Given the lack of historical vulnerabilities and the secure handling of other potential entry points, the risk associated with `shell_exec` might be mitigated by internal coding practices. Nevertheless, its presence warrants vigilance and thorough code review.
Key Concerns
- Presence of dangerous function 'shell_exec'
Atlas Content Modeler Security Vulnerabilities
Atlas Content Modeler Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Atlas Content Modeler Attack Surface
REST API Routes 14
WordPress Hooks 57
Maintenance & Trust
Atlas Content Modeler Maintenance & Trust
Maintenance Signals
Community Trust
Atlas Content Modeler Alternatives
No alternatives data available yet.
Atlas Content Modeler Developer Profile
8 plugins · 65K total installs
How We Detect Atlas Content Modeler
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/atlas-content-modeler/includes/settings/settings.css/wp-content/plugins/atlas-content-modeler/includes/shared-assets/dist/js/shared_assets.js/wp-content/plugins/atlas-content-modeler/includes/publisher/dist/js/app.jsshared_assetsacm-appatlas-content-modeler/includes/settings/settings.css?ver=atlas-content-modeler/includes/shared-assets/dist/js/shared_assets.js?ver=atlas-content-modeler/includes/publisher/dist/js/app.js?ver=HTML / DOM Fingerprints
acm-admin-noticeacm-app-container<!-- ACM - Start of App --><!-- ACM - End of App -->data-acm-model-slugdata-acm-post-idACMACMRelationshipACMPostType/wp-json/wp/v2/atlas-content-modeler/