Comments-advanced Security & Risk Analysis

wordpress.org/plugins/comments-advanced

Edit comment's info: Post ID, Parent Comment ID, User ID, Author IP, Author Agent and Comment Date.

40 active installs v2.0 PHP + WP 3.0+ Updated Aug 2, 2020
commentcommentsmeta
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Comments-advanced Safe to Use in 2026?

Generally Safe

Score 85/100

Comments-advanced has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "comments-advanced" v2.0 plugin exhibits a generally good security posture with no recorded vulnerabilities or critical code signals. The absence of known CVEs and a clean vulnerability history suggest a well-maintained and secure plugin. The code analysis reveals a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks. File operations and external HTTP requests are also absent, further reducing potential attack vectors. The plugin also demonstrates good practices in output escaping, with a high percentage of outputs properly handled.

However, a significant concern is the presence of the `unserialize` function without any apparent sanitization or capability checks. While the taint analysis shows no identified unsanitized flows, the use of `unserialize` is inherently risky as it can lead to Remote Code Execution (RCE) vulnerabilities if the serialized data originates from an untrusted source and is not properly validated before deserialization. Additionally, the lack of nonce checks on any entry points, though zero in number, represents a potential gap if new entry points were to be introduced without these security measures. The moderate use of prepared statements for SQL queries is acceptable but could be improved for greater consistency.

In conclusion, the plugin is strong in its minimal attack surface and good output escaping. The primary weakness lies in the potential for deserialization vulnerabilities due to the use of `unserialize` without explicit validation. While no direct evidence of exploitation exists in the provided data, this function warrants careful attention and potential remediation to ensure long-term security.

Key Concerns

  • Dangerous function: unserialize without checks
  • No nonce checks on entry points
  • 50% of SQL queries not using prepared statements
Vulnerabilities
None known

Comments-advanced Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Comments-advanced Release Timeline

v2.0Current
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Comments-advanced Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
2 prepared
Unescaped Output
3
15 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$user_role_array = unserialize($user_item['meta_value']);comments-advanced.php:115

SQL Query Safety

50% prepared4 total queries

Output Escaping

83% escaped18 total outputs
Attack Surface

Comments-advanced Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menucomments-advanced.php:15
actionedit_commentcomments-advanced.php:203
filterplugin_row_metacomments-advanced.php:216
Maintenance & Trust

Comments-advanced Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 2, 2020
PHP min version
Downloads3K

Community Trust

Rating94/100
Number of ratings6
Active installs40
Developer Profile

Comments-advanced Developer Profile

webvitaly

14 plugins · 128K total installs

66
trust score
Avg Security Score
81/100
Avg Patch Time
396 days
View full developer profile
Detection Fingerprints

How We Detect Comments-advanced

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
textright
Data Attributes
id="comment_post_id"id="comment_parent"id="comment_user_id"id="comment_author_ip"id="comment_agent"id="comment_date"
FAQ

Frequently Asked Questions about Comments-advanced