
Companion Auto Update Security & Risk Analysis
wordpress.org/plugins/companion-auto-updateManage all updates on your WordPress site. Stay in the know with several optional e-mail notifications and logs. For free.
Is Companion Auto Update Safe to Use in 2026?
Generally Safe
Score 89/100Companion Auto Update has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "companion-auto-update" plugin, version 3.9.3, exhibits a mixed security posture. While the static analysis reveals no obvious direct attack vectors like unprotected AJAX handlers, REST API routes, or shortcodes, and a significant percentage of SQL queries utilize prepared statements, several areas raise concern. The lack of capability checks on any entry points is a notable weakness, as is the moderate rate of output escaping (63%). The vulnerability history is particularly alarming, with four known CVEs, including one critical and two high severity vulnerabilities, spanning common attack types like XSS, SQL Injection, CSRF, and RFI. The presence of these past vulnerabilities, especially critical and high-severity ones, suggests a recurring pattern of insecure coding practices that may not have been fully remediated.
Despite the absence of critical taint flows and a seemingly limited attack surface from the static analysis, the historical vulnerability data points to a plugin that has been a target for attackers and has had significant security flaws in the past. The lack of capability checks on entry points, while not directly a vulnerability in this version, is a systemic risk that could be exploited if new entry points are introduced or if existing ones have subtle flaws. The moderate output escaping also leaves room for potential XSS vulnerabilities, especially in conjunction with past XSS issues. While there are no currently unpatched CVEs, the plugin's history suggests a high likelihood of future vulnerabilities if development practices do not rigorously address past issues and implement stronger security checks.
Key Concerns
- Vulnerability history: 1 critical CVE
- Vulnerability history: 2 high CVEs
- Vulnerability history: 1 medium CVE
- No capability checks on entry points
- Moderate output escaping (63%)
- 22 cron events, security not specified
- Raw SQL without prepare (22% of queries)
Companion Auto Update Security Vulnerabilities
CVEs by Year
Severity Breakdown
4 total CVEs
Companion Auto Update <= 3.9.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via update_delay_days parameter
Companion Auto Update <= 3.3.5 - Authenticated (Admin+) SQL Injection
Companion Auto Update <= 3.2.0 - Cross-Site Request Forgery
Companion Auto Update <= 3.2.0 - Local File Inclusion
Companion Auto Update Release Timeline
Companion Auto Update Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Companion Auto Update Attack Surface
WordPress Hooks 39
Scheduled Events 22
Maintenance & Trust
Companion Auto Update Maintenance & Trust
Maintenance Signals
Community Trust
Companion Auto Update Alternatives
Simple Automatic Updates
simple-automatic-updates
Activate automatic updates or weekly notifications for the site.
Disable Automatic Updates – Enable/Disable core, plugins, themes, translation updates
disable-automatic-updates
Control automatic updates feature. Enable or disable all types of automatic updates including core, plugins, themes, translation etc.
WPuppy
wpuppy
WPuppy is software for automatically updating Wordpress Plugins, Themes and Core.
Updatronix
updatronix
Manage WordPress updates with confidence. Control native auto-updates, track detailed logs, and route system emails to the right recipients.
KK-UPDATE-CONTROL
kk-update-control
A simple WordPress plugin to control automatic core updates or auto-updates for plugins, themes and translations.
Companion Auto Update Developer Profile
3 plugins · 60K total installs
How We Detect Companion Auto Update
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/companion-auto-update/css/cau-settings.css/wp-content/plugins/companion-auto-update/js/cau-settings.js/wp-content/plugins/companion-auto-update/js/cau-settings.jscompanion-auto-update/css/cau-settings.css?ver=companion-auto-update/js/cau-settings.js?ver=HTML / DOM Fingerprints
cau-settings-page<!-- Auto Update: ON --><!-- WP CORE Auto Update: ON --><!-- PLUGINS Auto Update: ON --><!-- THEMES Auto Update: ON -->+4 moredata-cau-settingscau_settings_obj/wp-json/companion-auto-update/v1/settings