Custom Base Terms Security & Risk Analysis

wordpress.org/plugins/custom-base-terms

Modifique las estructuras personalizadas en las URLs para autor, búsqueda, comentarios, página y feed.

80 active installs v1.0.3 PHP + WP 2.7+ Updated May 10, 2023
authorcommentspaginationpermalinkssearch
85
A · Safe
CVEs total1
Unpatched0
Last CVEMay 10, 2023
Safety Verdict

Is Custom Base Terms Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Base Terms has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: May 10, 2023Updated 2yr ago
Risk Assessment

The plugin 'custom-base-terms' v1.0.3 presents a mixed security posture with some concerning findings despite a seemingly small attack surface. While the static analysis reports zero AJAX handlers, REST API routes, shortcodes, and cron events, which is positive for limiting entry points, the presence of a dangerous `unserialize` function is a significant red flag. This function, when handling untrusted data, can lead to arbitrary object injection vulnerabilities. The taint analysis revealing two flows with unsanitized paths, even if not classified as critical or high, further exacerbates this concern, suggesting potential for improper data handling.

The vulnerability history indicates a past medium vulnerability related to Cross-site Scripting (XSS), and while there are no currently unpatched CVEs, this history suggests a propensity for security issues. The fact that the last vulnerability was in May 2023, and the plugin has not been updated since then or has had security patches applied, is also noteworthy. The low percentage of properly escaped output (20%) across 15 total outputs is another area of weakness, increasing the risk of XSS vulnerabilities. Coupled with a complete lack of nonce and capability checks for any potential (though currently unseen) entry points, the plugin exhibits significant potential for exploitation if even a minor vulnerability is present. Overall, the plugin has a concerning number of potential weaknesses that outweigh its limited apparent attack surface.

Key Concerns

  • Dangerous function found (unserialize)
  • Taint analysis shows unsanitized paths
  • Low output escaping percentage (20%)
  • No nonce checks
  • No capability checks
  • Past medium vulnerability
Vulnerabilities
1

Custom Base Terms Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-2600medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Custom Base Terms <= 1.0.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'base'

May 10, 2023 Patched in 1.0.3 (258d)
Code Analysis
Analyzed Mar 16, 2026

Custom Base Terms Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
12
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugin = get_object_vars( unserialize( $respuesta['body'] ) );custom-base.php:187

Output Escaping

20% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
custom_base_terms_enlaces_permanentes (custom-base.php:99)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Base Terms Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
filterplugin_row_metacustom-base.php:57
actioninitcustom-base.php:96
actionload-options-permalink.phpcustom-base.php:115
filteroption_author_basecustom-base.php:161
filteroption_search_basecustom-base.php:162
filteroption_comments_basecustom-base.php:163
filteroption_pagination_basecustom-base.php:164
filteroption_feed_basecustom-base.php:165
actionadmin_enqueue_scriptscustom-base.php:210
Maintenance & Trust

Custom Base Terms Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 10, 2023
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs80
Developer Profile

Custom Base Terms Developer Profile

Art Project Group

9 plugins · 19K total installs

76
trust score
Avg Security Score
95/100
Avg Patch Time
258 days
View full developer profile
Detection Fingerprints

How We Detect Custom Base Terms

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-base-terms/assets/images/cabecera.jpg
Version Parameters
custom-base-terms/style.css?ver=custom-base-terms/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
artprojectgroupapg-tableapg
Data Attributes
data-plugin-url
JS Globals
custom_base_terms
FAQ

Frequently Asked Questions about Custom Base Terms