
Custom Base Terms Security & Risk Analysis
wordpress.org/plugins/custom-base-termsModifique las estructuras personalizadas en las URLs para autor, búsqueda, comentarios, página y feed.
Is Custom Base Terms Safe to Use in 2026?
Generally Safe
Score 85/100Custom Base Terms has a strong security track record. Known vulnerabilities have been patched promptly.
The plugin 'custom-base-terms' v1.0.3 presents a mixed security posture with some concerning findings despite a seemingly small attack surface. While the static analysis reports zero AJAX handlers, REST API routes, shortcodes, and cron events, which is positive for limiting entry points, the presence of a dangerous `unserialize` function is a significant red flag. This function, when handling untrusted data, can lead to arbitrary object injection vulnerabilities. The taint analysis revealing two flows with unsanitized paths, even if not classified as critical or high, further exacerbates this concern, suggesting potential for improper data handling.
The vulnerability history indicates a past medium vulnerability related to Cross-site Scripting (XSS), and while there are no currently unpatched CVEs, this history suggests a propensity for security issues. The fact that the last vulnerability was in May 2023, and the plugin has not been updated since then or has had security patches applied, is also noteworthy. The low percentage of properly escaped output (20%) across 15 total outputs is another area of weakness, increasing the risk of XSS vulnerabilities. Coupled with a complete lack of nonce and capability checks for any potential (though currently unseen) entry points, the plugin exhibits significant potential for exploitation if even a minor vulnerability is present. Overall, the plugin has a concerning number of potential weaknesses that outweigh its limited apparent attack surface.
Key Concerns
- Dangerous function found (unserialize)
- Taint analysis shows unsanitized paths
- Low output escaping percentage (20%)
- No nonce checks
- No capability checks
- Past medium vulnerability
Custom Base Terms Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Custom Base Terms <= 1.0.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'base'
Custom Base Terms Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Custom Base Terms Attack Surface
WordPress Hooks 9
Maintenance & Trust
Custom Base Terms Maintenance & Trust
Maintenance Signals
Community Trust
Custom Base Terms Alternatives
Rewrite Bases Internationalization
rewrite-bases-internationalization
Internationalize rewrite bases for author, search, comments and page (pagination) slugs in WordPress.
Get Author's Comments
get-authors-comments
Get Author's Comments displays or retrieves a list of comments posted by a user.
cbnet Multi Author Comment Notification
cbnet-multi-author-comment-notification
Send comment notification and comment moderation emails to multiple users. Select users individually or by user role, or send emails to arbitrary emai …
Greek Multi Tool – Greeklish Slugs, Permalinks & Transliteration
greek-multi-tool
The only lightweight plugin you need for Greek WordPress sites. Auto-convert Greeklish slugs, optimize permalinks, and enhance search without bloat.
Comment Email Reply
comment-email-reply
Simply notifies comment-author via email if someone replies to his comment. Zero Configuration.
Custom Base Terms Developer Profile
9 plugins · 19K total installs
How We Detect Custom Base Terms
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/custom-base-terms/assets/images/cabecera.jpgcustom-base-terms/style.css?ver=custom-base-terms/script.js?ver=HTML / DOM Fingerprints
artprojectgroupapg-tableapgdata-plugin-urlcustom_base_terms