Change Permalink Helper Security & Risk Analysis

wordpress.org/plugins/change-permalink-helper

It checks the Permalink and redirects to the new URL, if it doesn't exist. It sends the header message "moved permanently 301"

1K active installs v1.1.1 PHP + WP 2.7+ Updated Apr 24, 2020
301permalinkredirectseourl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Change Permalink Helper Safe to Use in 2026?

Generally Safe

Score 85/100

Change Permalink Helper has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "change-permalink-helper" v1.1.1 plugin exhibits a mixed security posture. On one hand, the static analysis reveals no readily apparent attack surface through common vectors like AJAX, REST API, shortcodes, or cron events. Furthermore, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and ensuring all output is properly escaped, with no file operations or external HTTP requests observed.

However, the taint analysis raises significant concerns. Two identified flows with unsanitized paths are flagged as high severity. While the specific nature of these unsanitized paths isn't detailed, their presence in the code indicates potential for vulnerabilities if they involve user-supplied data. The lack of any recorded vulnerability history (CVEs) is positive but could also mean the plugin hasn't been extensively scrutinized or that past issues have been resolved. The absence of capability and nonce checks on any entry points, though there are none declared, is a potential weakness if new entry points were to be added in future versions without proper security measures.

In conclusion, while the plugin currently presents a low outward attack surface and adheres to secure coding practices for SQL and output, the identified high-severity taint flows are a critical red flag that require immediate investigation. The plugin's strengths lie in its responsible data handling for SQL and output, but the unsanitized path flows represent a clear and present danger. Its lack of historical vulnerabilities is a positive sign, but the identified code-level risks overshadow this in the immediate assessment.

Key Concerns

  • High severity taint flows with unsanitized paths
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Change Permalink Helper Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Change Permalink Helper Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
is404 (change_permalink_helper.php:56)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Change Permalink Helper Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedchange_permalink_helper.php:29
actiontemplate_redirectchange_permalink_helper.php:48
Maintenance & Trust

Change Permalink Helper Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 24, 2020
PHP min version
Downloads31K

Community Trust

Rating94/100
Number of ratings33
Active installs1K
Developer Profile

Change Permalink Helper Developer Profile

Syde GmbH (formerly Inpsyde)

3 plugins · 2K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
423 days
View full developer profile
Detection Fingerprints

How We Detect Change Permalink Helper

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Change Permalink Helper