Cross Site Copy Field for ACF Security & Risk Analysis

wordpress.org/plugins/cross-site-copy-field-for-acf

Copy and paste ACF field definitions between field groups and across WordPress sites.

0 active installs v1.0.1 PHP 7.4+ WP 5.8+ Updated Unknown
acfcopycustom-fieldsduplicatorpaste
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cross Site Copy Field for ACF Safe to Use in 2026?

Generally Safe

Score 100/100

Cross Site Copy Field for ACF has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "cross-site-copy-field-for-acf" plugin v1.0.1 exhibits a generally strong security posture based on the static analysis. All identified entry points, including AJAX handlers and REST API routes, are properly protected with authentication and capability checks. The code demonstrates good practices by exclusively using prepared statements for SQL queries and ensuring all output is properly escaped. Furthermore, the absence of any known vulnerabilities in its history suggests a commitment to security or a lack of past exploitation, which is a positive sign.

However, a significant concern arises from the presence of the `unserialize` function without explicit taint analysis results or clear sanitization controls. The `unserialize` function is inherently risky as it can lead to arbitrary code execution if used with untrusted data. While the static analysis did not report any specific unsanitized flows, the potential for this function to be exploited, especially if coupled with data sourced from user input that bypasses other checks, cannot be ignored.

In conclusion, the plugin has many strengths, including robust access control on its entry points, secure database interactions, and proper output escaping. The primary weakness lies in the `unserialize` function, which warrants further investigation or mitigation to ensure it's not a latent vulnerability. The lack of a history of vulnerabilities is encouraging, but the potential risk posed by `unserialize` means a complete assessment of its security cannot be made without deeper analysis of how this function is used and what data it processes.

Key Concerns

  • Dangerous function unserialize found
Vulnerabilities
None known

Cross Site Copy Field for ACF Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cross Site Copy Field for ACF Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
15 escaped
Nonce Checks
4
Capability Checks
6
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

unserialize$types = @unserialize($decoded);includes\class-license.php:46

Output Escaping

100% escaped15 total outputs
Attack Surface

Cross Site Copy Field for ACF Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_cscf_acf_get_fieldincludes\class-admin-ui.php:50
authwp_ajax_cscf_acf_paste_fieldincludes\class-admin-ui.php:51
authwp_ajax_cscf_deactivation_feedbackincludes\class-deactivation.php:15
WordPress Hooks 11
actionadmin_noticescross-site-copy-field-acf.php:34
actionplugins_loadedcross-site-copy-field-acf.php:132
actionacf/field_group/admin_enqueue_scriptsincludes\class-admin-ui.php:44
actionacf/field_group/admin_footerincludes\class-admin-ui.php:47
actionadmin_enqueue_scriptsincludes\class-deactivation.php:14
actionrest_api_initincludes\class-rest-api.php:50
actionadmin_menuincludes\class-tracking.php:14
actionadmin_initincludes\class-tracking.php:15
actionadmin_initincludes\class-tracking.php:16
actionadmin_enqueue_scriptsincludes\class-tracking.php:17
actionupgrader_process_completeincludes\class-tracking.php:18
Maintenance & Trust

Cross Site Copy Field for ACF Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads186

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Cross Site Copy Field for ACF Developer Profile

Code and Core

8 plugins · 340 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cross Site Copy Field for ACF

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cross-site-copy-field-for-acf/assets/js/field-json-popup.js/wp-content/plugins/cross-site-copy-field-for-acf/assets/js/admin-field-actions.js
Script Paths
/wp-content/plugins/cross-site-copy-field-for-acf/assets/js/field-json-popup.js/wp-content/plugins/cross-site-copy-field-for-acf/assets/js/admin-field-actions.js
Version Parameters
cross-site-copy-field-for-acf/assets/js/field-json-popup.js?ver=cross-site-copy-field-for-acf/assets/js/admin-field-actions.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-nonce="cscf_acf_nonce"
JS Globals
cscfAcf
FAQ

Frequently Asked Questions about Cross Site Copy Field for ACF