
Bunu Kopyala Security & Risk Analysis
wordpress.org/plugins/bunu-kopyalaThis is a plugin designed to create copies of pages or posts. You can quickly install it and freely copy as many posts and pages as you want.
Is Bunu Kopyala Safe to Use in 2026?
Generally Safe
Score 85/100Bunu Kopyala has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "bunu-kopyala" v1.6 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code demonstrates good practices by utilizing prepared statements for all SQL queries and properly escaping all outputs, indicating a mindful approach to preventing common vulnerabilities like SQL injection and XSS. The plugin also avoids file operations and external HTTP requests, further reducing its risk profile.
However, a concern arises from the taint analysis, which identified one flow with an unsanitized path with high severity. While the specific nature of this flow isn't detailed, it suggests a potential pathway for malicious data to be processed without adequate sanitization, which could lead to unintended consequences. The lack of nonce checks and the single capability check also present a minor weakness, especially if the plugin were to introduce any form of user interaction or data manipulation in the future. The plugin's clean vulnerability history is a positive indicator of past security diligence.
In conclusion, "bunu-kopyala" v1.6 is largely secure, with its strengths lying in its limited attack surface and adherence to fundamental secure coding practices. The primary area for improvement is addressing the high-severity unsanitized taint flow. The absence of nonce checks and the minimal capability checks are minor points of concern that could be strengthened, particularly if the plugin's functionality were to expand. Overall, the plugin presents a low to moderate risk, with the taint flow being the most critical item to investigate.
Key Concerns
- High severity unsanitized taint flow
- 0 Nonce checks present
- 1 Capability check total
Bunu Kopyala Security Vulnerabilities
Bunu Kopyala Release Timeline
Bunu Kopyala Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Bunu Kopyala Attack Surface
WordPress Hooks 3
Maintenance & Trust
Bunu Kopyala Maintenance & Trust
Maintenance Signals
Community Trust
Bunu Kopyala Alternatives
Duplicate Page
duplicate-page
Duplicate Posts, Pages and Custom Posts easily using single click
Duplicate Post
copy-delete-posts
Duplicate post
Duplicate Page and Post
duplicate-wp-page-post
Duplicate post, Duplicate page and Duplicate custom post or clone page and clone post.
WP Post Page Clone
wp-post-page-clone
Clone Post or Page with it's contents and settings in just one click.
WP Duplicate Page
wp-duplicate-page
Clone WordPress page, post, custom post types
Bunu Kopyala Developer Profile
2 plugins · 0 total installs
How We Detect Bunu Kopyala
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/bunu-kopyala/bunu-kopyala.phpHTML / DOM Fingerprints
title="Bu içeriğin bir kopyasını oluştur"rel="permalink"Bunu Kopyala