Change Author Security & Risk Analysis

wordpress.org/plugins/change-author

This plugin lets you assign non-authors as post author.

1K active installs v1.3 PHP + WP 3.0.1+ Updated Nov 28, 2017
any-user-authorauthorcustom-authorcustom-post-authoruser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Change Author Safe to Use in 2026?

Generally Safe

Score 85/100

Change Author has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "change-author" plugin v1.3 exhibits a strong security posture based on the provided static analysis. There are no identified attack surface points such as AJAX handlers, REST API routes, shortcodes, or cron events that could be exploited without proper authentication. The code also demonstrates excellent security practices by not utilizing dangerous functions, all SQL queries are prepared, and all outputs are properly escaped. Furthermore, the plugin avoids file operations, external HTTP requests, and incorporates no bundled libraries, all of which reduce potential vulnerabilities. The complete absence of any recorded CVEs, including critical or high severity ones, and the lack of recorded vulnerability history further bolster its security profile. However, the analysis also notes a complete absence of nonce checks and capability checks. While the current lack of an exposed attack surface might mitigate immediate risks, this absence represents a significant potential weakness if new entry points are introduced in future updates or if the plugin's functionality implicitly relies on these checks in ways not apparent from this static analysis alone. The zero taint analysis flows, while positive, could also be attributed to a lack of complex data processing or user interaction within the plugin, which might not reveal underlying issues if they existed.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Change Author Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Change Author Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Change Author Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadd_meta_boxeschange-author.php:22
Maintenance & Trust

Change Author Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 28, 2017
PHP min version
Downloads40K

Community Trust

Rating80/100
Number of ratings12
Active installs1K
Developer Profile

Change Author Developer Profile

Martin Teley

2 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Change Author

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/change-author/css/style.css
Version Parameters
change-author/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
screen-reader-text
FAQ

Frequently Asked Questions about Change Author