Change Text Case Security & Risk Analysis

wordpress.org/plugins/change-case-for-tinymce

Change Case adds buttons to change text case in the WordPress visual editor.

2K active installs v2.3.2 PHP 7.4+ WP 3.3+ Updated May 5, 2025
caseeditortexttinymce
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Change Text Case Safe to Use in 2026?

Generally Safe

Score 92/100

Change Text Case has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "change-case-for-tinymce" v2.3.2 demonstrates a generally good security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. The code also shows strong adherence to secure coding practices, with 100% of SQL queries using prepared statements and all outputs being properly escaped. Furthermore, there are no known vulnerabilities or CVEs associated with this plugin, indicating a history of secure development or effective maintenance.

However, the presence of three instances of the `unserialize` function represents a significant concern. While the analysis does not show any taint flows indicating immediate exploitation, `unserialize` is inherently risky if used with untrusted data. Without proper validation of the data being unserialized, it can lead to Remote Code Execution (RCE) vulnerabilities. The lack of nonce checks is also a minor concern, though its impact is mitigated by the very small attack surface and the presence of two capability checks.

In conclusion, the plugin is strong in areas like SQL security, output escaping, and its vulnerability history. The primary weakness lies in the use of `unserialize`, which, if not handled with extreme care and input validation, could become a serious security flaw. The minimal attack surface and lack of known historical vulnerabilities are positive indicators, but the `unserialize` function warrants careful review and potential mitigation.

Key Concerns

  • Use of unserialize() function
  • Missing nonce checks
Vulnerabilities
None known

Change Text Case Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Change Text Case Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Change Text Case Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$current = unserialize( $current );change-case.php:35
unserializeif ( is_serialized( $current ) ) {$current = unserialize( $current );}change-case.php:56
unserializeif ( is_serialized( $current ) ) {$current = unserialize( $current );}change-case.php:89
Attack Surface

Change Text Case Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitchange-case.php:23
filtertiny_mce_versionchange-case.php:24
actionadmin_menuchange-case.php:25
filtermce_external_pluginschange-case.php:49
filtermce_buttonschange-case.php:50
Maintenance & Trust

Change Text Case Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 5, 2025
PHP min version7.4
Downloads41K

Community Trust

Rating96/100
Number of ratings21
Active installs2K
Developer Profile

Change Text Case Developer Profile

Michael Aronoff

2 plugins · 5K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
230 days
View full developer profile
Detection Fingerprints

How We Detect Change Text Case

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Change Text Case