Custom Bulk Actions Security & Risk Analysis

wordpress.org/plugins/custom-bulk-actions

Currently Wordpress doesn't allow you to add custom bulk actions. Adding them is super easy with this plugin.

100 active installs v0.1.4 PHP 5.6.0+ WP 3.9+ Updated Jul 28, 2020
bulk-actionscustomcustom-postmass-editpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Bulk Actions Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Bulk Actions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "custom-bulk-actions" plugin v0.1.4 exhibits a generally strong security posture based on the provided static analysis. The plugin has a minimal attack surface with no registered AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential for external exploitation. Furthermore, the code signals indicate no dangerous functions, external HTTP requests, or file operations, and all SQL queries utilize prepared statements, which are excellent security practices. The presence of a nonce check, even if only one, is also a positive sign.

However, a significant concern arises from the output escaping analysis, which shows that 100% of the five identified outputs are not properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. If user-supplied data or any dynamic content is directly outputted without sanitization or escaping, an attacker could inject malicious scripts into the web page, potentially leading to session hijacking, defacement, or other harmful actions.

Given the absence of any recorded vulnerability history, this suggests the plugin has not been a target of past known exploits. This, combined with the otherwise robust code practices, points to a plugin that is likely developed with security in mind, but with a critical oversight in output sanitization. The plugin's strengths lie in its limited attack surface and secure data handling for SQL. Its primary weakness is the unescaped output, which presents a direct and exploitable risk.

Key Concerns

  • 0% of outputs are properly escaped
Vulnerabilities
None known

Custom Bulk Actions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Bulk Actions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
custom_bulk_action (custom-bulk-actions.php:114)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Bulk Actions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_footer-edit.phpcustom-bulk-actions.php:78
actionload-edit.phpcustom-bulk-actions.php:79
actionadmin_noticescustom-bulk-actions.php:80
Maintenance & Trust

Custom Bulk Actions Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 28, 2020
PHP min version5.6.0
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Custom Bulk Actions Developer Profile

Otto Kekäläinen

4 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Bulk Actions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/custom-bulk-actions/custom-bulk-actions.php

HTML / DOM Fingerprints

JS Globals
custom_bulk_action_js
FAQ

Frequently Asked Questions about Custom Bulk Actions