Custom Post Type Permalinks Security & Risk Analysis

wordpress.org/plugins/custom-post-type-permalinks

Edit the permalink of custom post type.

200K active installs v3.5.3 PHP 7.4+ WP 6.1+ Updated Oct 10, 2024
addresscustom-post-typelinkpermalinkurl
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Post Type Permalinks Safe to Use in 2026?

Generally Safe

Score 92/100

Custom Post Type Permalinks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin "custom-post-type-permalinks" version 3.5.3 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any recorded CVEs, critical taint flows, dangerous functions, direct SQL queries, file operations, or external HTTP requests is highly encouraging. The code also demonstrates good practices with 100% of SQL queries using prepared statements and a significant majority (85%) of outputs being properly escaped. The presence of a nonce check is also a positive indicator.

However, there are a few areas that prevent a perfect score. The lack of capability checks is a potential concern, as it means that while nonces might be in place for some operations, authorization might not be rigorously enforced for all actions. While the static analysis reports zero unprotected entry points, a more detailed audit of the single nonce check and the absence of capability checks would be beneficial to confirm this. The limited taint analysis (0 flows analyzed) means that the absence of vulnerabilities in this area is based on incomplete data, and deeper analysis could reveal issues.

In conclusion, this plugin appears to be well-developed from a security perspective, with a strong emphasis on preventing common web vulnerabilities. The primary area for potential improvement lies in ensuring robust authorization checks through capability checks for all relevant functionalities. Given the lack of any historical vulnerabilities and the positive static analysis findings, the overall risk is low, but not entirely negligible.

Key Concerns

  • Missing capability checks
  • Limited taint analysis data
  • Some outputs not properly escaped
Vulnerabilities
None known

Custom Post Type Permalinks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Post Type Permalinks Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
28 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

85% escaped33 total outputs
Attack Surface

Custom Post Type Permalinks Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionadmin_initCPTP\Module\Admin.php:20
actionadmin_enqueue_scriptsCPTP\Module\Admin.php:21
actionadmin_noticesCPTP\Module\Admin.php:22
actioninitCPTP\Module\FlushRules.php:20
actionadd_option_cptp_versionCPTP\Module\FlushRules.php:21
actionupdate_option_cptp_versionCPTP\Module\FlushRules.php:22
actionwp_loadedCPTP\Module\FlushRules.php:23
actionupdate_option_no_taxonomy_structureCPTP\Module\FlushRules.php:36
filtergetarchives_joinCPTP\Module\GetArchives.php:21
filtergetarchives_whereCPTP\Module\GetArchives.php:22
filterget_archives_linkCPTP\Module\GetArchives.php:23
actioninitCPTP\Module\Option.php:21
actionadmin_initCPTP\Module\Option.php:22
filterpost_type_linkCPTP\Module\Permalink.php:20
filterterm_linkCPTP\Module\Permalink.php:27
filterattachment_linkCPTP\Module\Permalink.php:34
filterwpml_st_post_type_link_filter_original_slugCPTP\Module\Permalink.php:41
actionparse_requestCPTP\Module\Rewrite.php:20
actionregistered_post_typeCPTP\Module\Rewrite.php:21
actionregistered_taxonomyCPTP\Module\Rewrite.php:22
actioninitCPTP\Module\Setting.php:20
actionupgrader_process_completeCPTP\Module\Setting.php:21
actioncptp_initCPTP\Module.php:24
Maintenance & Trust

Custom Post Type Permalinks Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 10, 2024
PHP min version7.4
Downloads1.7M

Community Trust

Rating96/100
Number of ratings71
Active installs200K
Developer Profile

Custom Post Type Permalinks Developer Profile

Toro_Unit (Hiroshi Urabe)

23 plugins · 216K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Type Permalinks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-post-type-permalinks/css/custom-post-type-permalinks.css/wp-content/plugins/custom-post-type-permalinks/js/custom-post-type-permalinks.js
Script Paths
/wp-content/plugins/custom-post-type-permalinks/js/custom-post-type-permalinks.js
Version Parameters
custom-post-type-permalinks/css/custom-post-type-permalinks.css?ver=custom-post-type-permalinks/js/custom-post-type-permalinks.js?ver=

HTML / DOM Fingerprints

CSS Classes
cptp-content-editor-wrapper
HTML Comments
<!-- The tags you can use are WordPress structure tags and taxonomy tags. --><!-- Available taxonomy tags: --><!-- If you need post type permalink only, you should use <a href="%s">Simple Post Type Permalinks</a>. --><!-- If <code>has_archive</code> is true, add permalinks for custom post type archive. -->+3 more
Data Attributes
data-cptp-setting-id
JS Globals
cptp_data
FAQ

Frequently Asked Questions about Custom Post Type Permalinks