
Automatic Domain Changer Security & Risk Analysis
wordpress.org/plugins/automatic-domain-changerAutomatically detects a domain name change, and updates all the WordPress tables in the database to reflect this change.
Is Automatic Domain Changer Safe to Use in 2026?
Generally Safe
Score 100/100Automatic Domain Changer has a strong security track record. Known vulnerabilities have been patched promptly.
The "automatic-domain-changer" v2.0.4 plugin exhibits a mixed security posture. While it demonstrates some good practices by implementing nonce and capability checks for its limited entry points and avoids external HTTP requests and file operations, significant concerns arise from its code signals. The presence of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution if used with untrusted serialized data. Furthermore, the static analysis reveals a concerning 75% of outputs are not properly escaped, indicating a high potential for Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also highlights 3 flows with unsanitized paths, suggesting potential injection risks despite no critical or high severity flows being identified.
The vulnerability history shows one past medium severity CVE related to Cross-Site Scripting, reinforcing the risk of improper output escaping. The fact that this vulnerability is no longer unpatched is positive, but the past occurrence of XSS, combined with the current static analysis findings, suggests a persistent weakness in output sanitization. The limited attack surface (0 entry points) is a strength, but the identified risks within the code, particularly `unserialize` and unescaped output, coupled with the past XSS vulnerability, necessitate caution. The plugin needs to address its output escaping and the usage of `unserialize` to improve its overall security.
Key Concerns
- Presence of unserialize function
- High percentage of unescaped output
- Flows with unsanitized paths identified
- Past medium severity CVE for XSS
Automatic Domain Changer Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Automatic Domain Changer <= 2.0.2 - Reflected Cross-Site Scripting
Automatic Domain Changer Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Automatic Domain Changer Attack Surface
WordPress Hooks 2
Maintenance & Trust
Automatic Domain Changer Maintenance & Trust
Maintenance Signals
Community Trust
Automatic Domain Changer Alternatives
ezRedirect
ezredirect
Allows the creation of redirections to internal pages and posts, and external addresses.
Nofollow Case by Case
nofollow-case-by-case
"Dofollow" but Nofollow Case by Case allows you to selectively apply nofollow to your comments as well.
Auto Copyright
auto-copyright-1
Automatically generates a copyright notice based on the first and last post published in the WordPress database.
LightStart – Maintenance Mode, Coming Soon and Landing Page Builder
wp-maintenance-mode
Easy Drag & Drop Page Builder that adds a splash page to your site that it's perfect for a coming soon page, maintenance or landing page.
Adminimize
adminimize
Adminimize that lets you hide 'unnecessary' items from the WordPress backend
Automatic Domain Changer Developer Profile
3 plugins · 10K total installs
How We Detect Automatic Domain Changer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/automatic-domain-changer/css/admin.css/wp-content/plugins/automatic-domain-changer/js/admin.js/wp-content/plugins/automatic-domain-changer/js/admin.jsautomatic-domain-changer/css/admin.css?ver=automatic-domain-changer/js/admin.js?ver=HTML / DOM Fingerprints
adc-widefatadc-selectname="old-domain"id="old-domain"name="new-domain"id="new-domain"name="https-domain"id="https-domain"+4 more