Change Core Slugs Security & Risk Analysis

wordpress.org/plugins/change-core-slugs

Set custom permalink slugs instead of default ones.

10 active installs v1.0.0 PHP 5.4+ WP 4.9+ Updated Mar 30, 2019
permalinkslugurl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Change Core Slugs Safe to Use in 2026?

Generally Safe

Score 85/100

Change Core Slugs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The static analysis of the "change-core-slugs" plugin v1.0.0 reveals a strong adherence to secure coding practices. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the plugin's attack surface. Furthermore, the code demonstrates excellent signal hygiene, with no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The lack of file operations, external HTTP requests, and the absence of sensitive code signals like nonces or capability checks, when combined with the lack of identified taint flows, indicates a well-contained and secure codebase from a static analysis perspective. The plugin's vulnerability history is also remarkably clean, with zero known CVEs, unpatched vulnerabilities, or recorded common vulnerability types. This suggests a history of stability and a lack of previously exploited weaknesses.

Despite the overwhelmingly positive static analysis and vulnerability history, the complete absence of any capability checks or nonce checks is a notable, albeit minor, point of concern, especially if the plugin were to evolve and introduce new functionalities that might require access control or state manipulation. However, given the current state of the plugin with zero identified entry points and a clean history, the overall security posture is exceptionally good. The plugin's strengths lie in its minimal attack surface and diligent secure coding practices, while its only potential weakness, which is currently theoretical due to its limited functionality, is the lack of explicit capability enforcement for potential future features.

Key Concerns

  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Change Core Slugs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Change Core Slugs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped13 total outputs
Attack Surface

Change Core Slugs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionplugins_loadedchange-core-slugs.php:48
actionadmin_menuinc\Admin\Page\Settings.php:57
actionadmin_initinc\Admin\Page\Settings.php:60
actioninitinc\Main.php:45
actionadmin_menuinc\Main.php:48
actionafter_setup_themeinc\Main.php:51
actiondeactivate_change-core-slugs/change-core-slugs.phpinc\Main.php:53
actionparse_queryinc\Main.php:55
filterplugin_action_linksinc\Main.php:58
actionshutdowninc\Rewrite.php:75
Maintenance & Trust

Change Core Slugs Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMar 30, 2019
PHP min version5.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Change Core Slugs Developer Profile

Milan Dinić

20 plugins · 48K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Change Core Slugs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Change Core Slugs