AutoLink Security & Risk Analysis

wordpress.org/plugins/auto-link

This plugin takes delimiters and replaces them with links using the GoogleAPI.

100 active installs v0.5 PHP + WP 2.1.2+ Updated Sep 27, 2007
autoauto-linkgooglelinklinks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AutoLink Safe to Use in 2026?

Generally Safe

Score 85/100

AutoLink has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 18yr ago
Risk Assessment

The "auto-link" v0.5 plugin exhibits a mixed security posture. On the positive side, it has no known vulnerabilities in its history and boasts 100% of its SQL queries using prepared statements, indicating good practices for database interactions. Furthermore, the attack surface appears minimal with zero AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, none of these entry points are unprotected. However, significant concerns arise from the static analysis. The presence of the `unserialize` function without any apparent checks or controls is a critical risk, as it can lead to object injection vulnerabilities if untrusted data is passed to it. The low percentage of properly escaped output (13%) suggests that cross-site scripting (XSS) vulnerabilities are highly probable when user-supplied data is displayed on the frontend.

Despite the absence of historical vulnerabilities, the identified code signals point to potentially serious security weaknesses. The `unserialize` function is a known dangerous function, and its inclusion without further context or safeguards is a major red flag. The extensive file operations (17) coupled with the low output escaping rate and the use of `unserialize` could create a potent combination for exploitation. The vulnerability history being clean is a positive indicator, but it doesn't negate the inherent risks identified in the code itself. The plugin needs immediate attention regarding the sanitization and escaping of output and a thorough review of how `unserialize` is being used.

Key Concerns

  • Presence of 'unserialize' function
  • Low percentage of properly escaped output
  • Zero nonce checks
  • Zero capability checks
Vulnerabilities
None known

AutoLink Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AutoLink Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
13
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
17
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserializereturn (!is_null($s)) ? unserialize($s) : null;class.wsdlcache.php:99

Output Escaping

13% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
auto_link_options_panel (auto_link.php:101)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AutoLink Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtercontent_save_preauto_link.php:14
actionadmin_menuauto_link.php:15
filtercomment_save_preauto_link.php:16
Maintenance & Trust

AutoLink Maintenance & Trust

Maintenance Signals

WordPress version tested2.3
Last updatedSep 27, 2007
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

AutoLink Developer Profile

blackc2004

5 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AutoLink

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about AutoLink