Changes Security & Risk Analysis

wordpress.org/plugins/changes

Checks your posts against the original content, providing the percentage of changes.

10 active installs v1.0.3 PHP + WP 3.0+ Updated Sep 16, 2013
changescontributoseditpercentageplr
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Changes Safe to Use in 2026?

Generally Safe

Score 85/100

Changes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "changes" v1.0.3 plugin exhibits a mixed security posture. On the positive side, it has a clean vulnerability history with no known CVEs, indicating a potentially stable and well-maintained codebase. The absence of dangerous functions, external HTTP requests, and file operations is also reassuring. Furthermore, all SQL queries are properly prepared, and there are no bundled libraries that could introduce outdated dependencies.

However, significant concerns arise from the static analysis. The plugin has a single entry point, an AJAX handler, which crucially lacks any authentication or capability checks. This creates a substantial attack vector. The taint analysis also reveals two flows with unsanitized paths, although they are not classified as critical or high severity. Coupled with the low percentage of properly escaped output (29%), these unsanitized paths could potentially lead to vulnerabilities if exploited in conjunction with other weaknesses or if they interact with sensitive data in unexpected ways.

In conclusion, while the plugin benefits from a lack of historical vulnerabilities and good practices in areas like SQL querying, the unprotected AJAX handler and the presence of unsanitized paths present a notable risk. The potential for unauthorized actions via the AJAX endpoint is the most immediate and severe concern. The low output escaping further exacerbates this, as it could facilitate cross-site scripting (XSS) attacks if attacker-controlled data is passed through these unsanitized paths.

Key Concerns

  • AJAX handler without auth checks
  • Flows with unsanitized paths
  • Low output escaping percentage
Vulnerabilities
None known

Changes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Changes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
setup_stopwords (changes.php:130)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Changes Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_sppdupexam_diffcheckchanges.php:108
WordPress Hooks 6
actionadmin_initchanges.php:15
actionadmin_menuchanges.php:22
actionload-post.phpchanges.php:30
actionload-post-new.phpchanges.php:31
actionadd_meta_boxeschanges.php:51
actionsave_postchanges.php:96
Maintenance & Trust

Changes Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 16, 2013
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Changes Developer Profile

Free plug in by SEO Roma

2 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Changes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/changes/inc/styles.css/wp-content/plugins/changes/inc/changes.js
Script Paths
/wp-content/plugins/changes/inc/changes.js

HTML / DOM Fingerprints

CSS Classes
changes-badchanges-good
JS Globals
changes_js_params
FAQ

Frequently Asked Questions about Changes