Auto Approve Comments Security & Risk Analysis

wordpress.org/plugins/auto-approve-comments

Auto approve comments by Commenter (email, name, url), User and Role (Akismet and wpDiscuz compatible)

200 active installs v2.8 PHP + WP 3.8+ Updated Jun 15, 2021
anti-spamauto-approvecommentsmoderation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Approve Comments Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Approve Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The auto-approve-comments v2.8 plugin demonstrates generally good security practices, with all identified entry points (AJAX handlers, REST API routes, shortcodes, and cron events) appearing to have authentication or permission checks. The use of prepared statements for all SQL queries is a significant strength, mitigating SQL injection risks. Additionally, the absence of known CVEs and common vulnerability types in its history suggests a historically stable and secure plugin. However, a concerning signal is the presence of the `unserialize` function. If user-supplied data is ever passed to `unserialize` without proper sanitization or validation, it could lead to object injection vulnerabilities, which are often critical.

The static analysis revealed a limited attack surface, with all entry points secured. The code signals indicate a mix of good practices (prepared statements, capability checks, nonce checks) and one notable area for improvement: output escaping. With only 55% of outputs properly escaped, there's a risk of cross-site scripting (XSS) vulnerabilities if user-controlled data is outputted directly to the browser without adequate sanitization. The taint analysis showing no unsanitized paths is reassuring but doesn't entirely negate the potential risk posed by `unserialize` and imperfect output escaping.

Overall, the plugin has a solid foundation with its secure entry points and SQL handling. The lack of historical vulnerabilities is positive. The primary areas of concern revolve around the potential for `unserialize` vulnerabilities and the incomplete output escaping, which could expose users to XSS attacks. While the risk is currently mitigated by the absence of identified exploit chains, these are potential weak points that require attention.

Key Concerns

  • Presence of unserialize function
  • Insufficient output escaping (45% unescaped)
Vulnerabilities
None known

Auto Approve Comments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Approve Comments Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
5 prepared
Unescaped Output
5
6 escaped
Nonce Checks
1
Capability Checks
6
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$results = array_keys( unserialize( $wpdb->get_var($sql) ) );auto-approve-comments.php:243

SQL Query Safety

100% prepared5 total queries

Output Escaping

55% escaped11 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
aac_ajax_save_configuration (auto-approve-comments.php:280)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Auto Approve Comments Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 5

authwp_ajax_aac_ajax_get_commenters_suggestionsauto-approve-comments.php:35
authwp_ajax_aac_ajax_get_usernames_suggestionsauto-approve-comments.php:36
authwp_ajax_aac_ajax_get_roles_suggestionsauto-approve-comments.php:37
authwp_ajax_aac_ajax_save_configurationauto-approve-comments.php:40
authwp_ajax_aac_ajax_refresh_configurationauto-approve-comments.php:41
WordPress Hooks 4
actionadmin_menuauto-approve-comments.php:30
actionadmin_initauto-approve-comments.php:32
actionwp_insert_commentauto-approve-comments.php:33
actionadmin_enqueue_scriptsauto-approve-comments.php:34
Maintenance & Trust

Auto Approve Comments Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJun 15, 2021
PHP min version
Downloads10K

Community Trust

Rating64/100
Number of ratings5
Active installs200
Developer Profile

Auto Approve Comments Developer Profile

Federico Andrioli

2 plugins · 500 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Approve Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-approve-comments/css/auto-approve-comments.css/wp-content/plugins/auto-approve-comments/js/auto-approve-comments.js/wp-content/plugins/auto-approve-comments/js/ajax-commenters-suggestions.js/wp-content/plugins/auto-approve-comments/js/ajax-roles-suggestions.js/wp-content/plugins/auto-approve-comments/js/ajax-save-refresh-configuration.js/wp-content/plugins/auto-approve-comments/js/ajax-usernames-suggestions.js
Script Paths
/wp-content/plugins/auto-approve-comments/js/auto-approve-comments.js/wp-content/plugins/auto-approve-comments/js/ajax-commenters-suggestions.js/wp-content/plugins/auto-approve-comments/js/ajax-roles-suggestions.js/wp-content/plugins/auto-approve-comments/js/ajax-save-refresh-configuration.js/wp-content/plugins/auto-approve-comments/js/ajax-usernames-suggestions.js
Version Parameters
auto-approve-comments.js?ver=1.2.0auto-approve-comments.css?ver=1.1.0ajax-commenters-suggestions.js?ver=1.2.0ajax-usernames-suggestions.js?ver=1.2.0ajax-roles-suggestions.js?ver=1.2.0ajax-save-refresh-configuration.js?ver=1.2.0

HTML / DOM Fingerprints

CSS Classes
aac-configuration-section
Data Attributes
data-aac-settingdata-aac-typedata-aac-save-configdata-aac-refresh-configdata-aac-setting-val
JS Globals
auto_approve_comments_ajax_params
REST Endpoints
/wp-json/auto-approve-comments/v1/settings
FAQ

Frequently Asked Questions about Auto Approve Comments