Automatic File Renamer Security & Risk Analysis

wordpress.org/plugins/automatic-file-renamer

Automatic File Renamer let you rename with prefix or suffix media's name, and redirect attachment pages where you want (3 options).

40 active installs v0.2.81 PHP 7.0+ WP 5.6+ Updated Apr 10, 2025
attachmentmedia-slugmedia-titleredirection-attached-pagerename
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Automatic File Renamer Safe to Use in 2026?

Generally Safe

Score 92/100

Automatic File Renamer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'automatic-file-renamer' plugin v0.2.81 exhibits a mixed security posture. On the positive side, the plugin demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and having no recorded vulnerabilities or CVEs in its history. This suggests a generally well-maintained and secure codebase, with no obvious external threats identified through its vulnerability history.

However, there are notable concerns arising from the static analysis. The presence of a single flow with an unsanitized path is a significant risk, as it could potentially lead to path traversal vulnerabilities if not handled carefully. Additionally, the low percentage of properly escaped output (21%) indicates a high risk of cross-site scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks for its entry points, though the attack surface is currently zero, means that if any entry points were to be introduced in the future without proper authentication, they would be inherently insecure.

While the lack of known vulnerabilities is a good sign, the identified code signals, particularly the unsanitized path flow and the extensive unescaped output, present immediate risks that require attention. Future development should prioritize addressing these areas to improve the plugin's overall security.

Key Concerns

  • Unsanitized path flow
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Automatic File Renamer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Automatic File Renamer Release Timeline

v0.2.81Current
v0.2.8
v0.2.7
v0.2.6
v0.2.5
v0.2.4
v0.2.3
v0.2.2
v0.2.1
v0.2.0
v0.1.9
v0.1.8
v0.1.7
Code Analysis
Analyzed Mar 16, 2026

Automatic File Renamer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
31
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

21% escaped39 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<AFR-Admin-Panel> (Admin\AFR-Admin-Panel.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Automatic File Renamer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitAdmin\AFR-Admin-functions.php:9
actionadmin_menuAdmin\AFR-Admin-functions.php:45
filtersanitize_file_nameAFR-init.php:42
actionadd_attachmentAFR-init.php:48
actiontemplate_redirectAFR-init.php:58
actiontemplate_redirectAFR-init.php:62
actiontemplate_redirectAFR-init.php:65
Maintenance & Trust

Automatic File Renamer Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedApr 10, 2025
PHP min version7.0
Downloads3K

Community Trust

Rating90/100
Number of ratings2
Active installs40
Developer Profile

Automatic File Renamer Developer Profile

Cellophile

1 plugin · 40 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Automatic File Renamer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Automatic File Renamer