
Comments-advanced Security & Risk Analysis
wordpress.org/plugins/comments-advancedEdit comment's info: Post ID, Parent Comment ID, User ID, Author IP, Author Agent and Comment Date.
Is Comments-advanced Safe to Use in 2026?
Generally Safe
Score 85/100Comments-advanced has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "comments-advanced" v2.0 plugin exhibits a generally good security posture with no recorded vulnerabilities or critical code signals. The absence of known CVEs and a clean vulnerability history suggest a well-maintained and secure plugin. The code analysis reveals a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks. File operations and external HTTP requests are also absent, further reducing potential attack vectors. The plugin also demonstrates good practices in output escaping, with a high percentage of outputs properly handled.
However, a significant concern is the presence of the `unserialize` function without any apparent sanitization or capability checks. While the taint analysis shows no identified unsanitized flows, the use of `unserialize` is inherently risky as it can lead to Remote Code Execution (RCE) vulnerabilities if the serialized data originates from an untrusted source and is not properly validated before deserialization. Additionally, the lack of nonce checks on any entry points, though zero in number, represents a potential gap if new entry points were to be introduced without these security measures. The moderate use of prepared statements for SQL queries is acceptable but could be improved for greater consistency.
In conclusion, the plugin is strong in its minimal attack surface and good output escaping. The primary weakness lies in the potential for deserialization vulnerabilities due to the use of `unserialize` without explicit validation. While no direct evidence of exploitation exists in the provided data, this function warrants careful attention and potential remediation to ensure long-term security.
Key Concerns
- Dangerous function: unserialize without checks
- No nonce checks on entry points
- 50% of SQL queries not using prepared statements
Comments-advanced Security Vulnerabilities
Comments-advanced Release Timeline
Comments-advanced Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Comments-advanced Attack Surface
WordPress Hooks 3
Maintenance & Trust
Comments-advanced Maintenance & Trust
Maintenance Signals
Community Trust
Comments-advanced Alternatives
Comments Extra Fields For Post,Pages and CPT
wp-comment-fields
This plugin allow admin to add extra fields in comment area. These fields are saved as comment meta and is displayed under comment text.
DoFollow State
dofollow-state
DoFollow State let your Wordpress webblog have dofollow structure for all links including links on comments.
JSM Show Comment Metadata
jsm-show-comment-meta
Show comment metadata in a metabox when editing comments - a great tool for debugging issues with comment metadata.
Remove Feed Links
remove-feed-links
Remove Feed Links is a simple plugin for removing feed links from the head of your web site.
MB Comment Meta
mb-comment-meta
Add custom fields for comments. Support 40+ field types with easy config.
Comments-advanced Developer Profile
14 plugins · 128K total installs
How We Detect Comments-advanced
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
textrightid="comment_post_id"id="comment_parent"id="comment_user_id"id="comment_author_ip"id="comment_agent"id="comment_date"