Bulk Comments Management Security & Risk Analysis

wordpress.org/plugins/bulk-comments-management

This plugin allows administrators to globally delete comments (spam, trash, unapproved comments), enable/disable comments on all posts.

700 active installs v1.0 PHP + WP 3.3+ Updated Nov 28, 2017
commentsdelete-commentsdelete-tracakbacksspamunapproved
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bulk Comments Management Safe to Use in 2026?

Generally Safe

Score 85/100

Bulk Comments Management has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "bulk-comments-management" v1.0 plugin exhibits a mixed security posture. On one hand, the absence of known CVEs and the presence of some security checks like nonces and capability checks suggest a degree of developer awareness regarding security. The static analysis also shows a remarkably small attack surface with no direct AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication, which is a significant strength.

However, the code analysis reveals critical weaknesses. The plugin heavily relies on raw SQL queries, with 100% of them not utilizing prepared statements, posing a high risk of SQL injection vulnerabilities. Furthermore, all identified output points are not properly escaped, creating a significant risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of taint analysis results might be due to the limited scope of analysis or the absence of complex data flows, but the existing signals of insecure SQL and output handling are sufficient to raise concerns.

Given the vulnerability history shows no past issues, it might suggest either a new plugin, a lack of historical reporting, or a developer who has historically been diligent. However, the current code analysis presents immediate and serious risks. The plugin's strengths lie in its limited attack surface, but the critical flaws in SQL query handling and output escaping overshadow this. Users should be cautious due to the high likelihood of SQL injection and XSS vulnerabilities.

Key Concerns

  • 100% of SQL queries not using prepared statements
  • 100% of outputs not properly escaped
  • Nonce check present but only 1 found
  • Capability check present but only 1 found
Vulnerabilities
None known

Bulk Comments Management Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Bulk Comments Management Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

0% escaped4 total outputs
Attack Surface

Bulk Comments Management Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menubulk-comments-management.php:26
Maintenance & Trust

Bulk Comments Management Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedNov 28, 2017
PHP min version
Downloads26K

Community Trust

Rating94/100
Number of ratings13
Active installs700
Developer Profile

Bulk Comments Management Developer Profile

Yakup Hoca

2 plugins · 780 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bulk Comments Management

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapupdated
Data Attributes
name="yakuphoca-bulk-comments-management-form"value="yakuphoca"name="delete_spam_comments"id="delete_spam_comments"name="delete_unapproved_comments"id="delete_unapproved_comments"+11 more
FAQ

Frequently Asked Questions about Bulk Comments Management