ClipLink Security & Risk Analysis

wordpress.org/plugins/cliplink

ClipLink allows you to create simple, customizable short links like /go/example to redirect users.

0 active installs v1.1 PHP + WP 5.0+ Updated Apr 10, 2025
go-linkslink-shortenersimple-redirecturl-redirect
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVEJun 19, 2025
Safety Verdict

Is ClipLink Safe to Use in 2026?

Mostly Safe

Score 78/100

ClipLink is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Jun 19, 2025Updated 12mo ago
Risk Assessment

The cliplink plugin version 1.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding output escaping, with all identified outputs being properly escaped. There are also no identified file operations or external HTTP requests, which generally reduces the attack surface. However, the static analysis reveals a significant concern: all three identified taint flows have unsanitized paths, with two of them flagged as high severity. This indicates potential vulnerabilities where user-supplied data might be used in an unsafe manner, leading to unexpected behavior or compromise. The plugin's vulnerability history is also a cause for concern. With one currently unpatched medium severity CVE, it suggests a pattern of past security issues. The fact that the last vulnerability was recorded in the future (2025-06-19) is a temporal anomaly in the data, but assuming it represents a real past issue, it highlights a need for more robust security practices. While the plugin has no apparent direct entry points like AJAX handlers or REST API routes in this version, the high severity taint flows indicate that vulnerabilities could still exist, especially if these flows are triggered indirectly or by future updates. The complete lack of nonce and capability checks on its entry points (even though there are zero identified) is a potential weakness if such entry points are added in future versions or if the identified taint flows are exploitable without these checks.

Key Concerns

  • High severity taint flows
  • Unsanitized paths in taint flows
  • Currently unpatched CVE
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
1

ClipLink Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49964medium · 4.3Cross-Site Request Forgery (CSRF)

ClipLink <= 1.1 - Cross-Site Request Forgery

Jun 19, 2025Unpatched
Version History

ClipLink Release Timeline

v1.1.11 CVE
v1.0.11 CVE
v1.0.01 CVE
Code Analysis
Analyzed Apr 6, 2026

ClipLink Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
0
19 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

100% escaped19 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
cliplink_admin_page (cliplink.php:75)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ClipLink Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitcliplink.php:39
actionadmin_menucliplink.php:72
Maintenance & Trust

ClipLink Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 10, 2025
PHP min version
Downloads580

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

ClipLink Developer Profile

mindgeekcy

2 plugins · 200 total installs

81
trust score
Avg Security Score
82/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ClipLink

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cliplink/cliplink.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ClipLink