Category Base Security & Risk Analysis

wordpress.org/plugins/category-base

Simply Remove Category Base from URL and show only category name in WordPress permalink.

0 active installs v1.0 PHP 5.6.20+ WP 3.0+ Updated Jan 10, 2024
categoriescategorypostpostsslug
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Category Base Safe to Use in 2026?

Generally Safe

Score 85/100

Category Base has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'category-base' v1.0 plugin exhibits a strong security posture. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code signals indicate a complete lack of dangerous functions, reliance on prepared statements for all SQL queries, and proper output escaping. The absence of file operations, external HTTP requests, nonce checks, and capability checks further reinforces this secure design, suggesting the plugin is not handling user-provided input in a way that would typically lead to vulnerabilities. The vulnerability history is also clean, with no known CVEs, suggesting a history of secure development or a lack of past exploitation.

However, the complete lack of any entry points (AJAX, REST API, shortcodes, cron events) is unusual. This could indicate a very simple plugin that performs no dynamic operations or interacts with the user in any way. If this is the case, its security is inherently high due to its limited functionality. Conversely, if the plugin is intended to have interactive features, the absence of these components in the analysis might suggest an incomplete scan or that the plugin's functionality is handled in a way not detectable by these static analysis metrics. The complete absence of nonce and capability checks, while not an issue in this specific analysis due to the lack of entry points, would be a critical concern if any user-facing or administrative functionality were present.

Vulnerabilities
None known

Category Base Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Category Base Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

Category Base Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Category Base Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtercategory_linkcategory-base.php:20
filtercategory_rewrite_rulescategory-base.php:50
actioninitcategory-base.php:56
Maintenance & Trust

Category Base Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedJan 10, 2024
PHP min version5.6.20
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Category Base Developer Profile

Sirius Pro

12 plugins · 1K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Category Base

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Category Base