Custom Post Type Rewrite Security & Risk Analysis

wordpress.org/plugins/custom-post-type-rewrite

Custom Post Type Rewrite plugin adds default custom post type permalinks.

1K active installs v1.2.1 PHP 5.6+ WP 4.9+ Updated Aug 22, 2024
custom-post-typepermalinkpermalink-structurepermalinks
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Post Type Rewrite Safe to Use in 2026?

Generally Safe

Score 92/100

Custom Post Type Rewrite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the "custom-post-type-rewrite" v1.2.1 plugin reveals a remarkably clean codebase with no immediately apparent vulnerabilities. The absence of dangerous functions, raw SQL queries, unescaped output, file operations, and external HTTP requests is a strong indicator of good security practices. Furthermore, the zero-count for AJAX handlers, REST API routes, shortcodes, and cron events, particularly without any authentication or permission checks, suggests a minimal attack surface. The plugin also boasts a completely clean vulnerability history, with no recorded CVEs, which is a positive sign of its stability and security over time.

While the current analysis presents an excellent security posture, it's important to acknowledge the limitations. The static analysis reported zero taint flows, which could mean either the plugin is exceptionally secure in its handling of potentially malicious data, or the static analysis tools may have limitations in tracing complex data flows within this specific plugin's context. The complete lack of nonces and capability checks, while not a direct vulnerability in this case due to the zero attack surface, represents a potential area of concern if the plugin were to be expanded in the future without incorporating these fundamental WordPress security measures. Overall, this plugin appears to be very secure based on the provided data, with its strengths lying in its minimalist design and adherence to secure coding principles.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Custom Post Type Rewrite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Post Type Rewrite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Custom Post Type Rewrite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_loadedinc\class-custom-post-type-rewrite.php:18
filterplugin_row_metainc\class-custom-post-type-rewrite.php:19
Maintenance & Trust

Custom Post Type Rewrite Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 22, 2024
PHP min version5.6
Downloads16K

Community Trust

Rating60/100
Number of ratings2
Active installs1K
Developer Profile

Custom Post Type Rewrite Developer Profile

thingsym

11 plugins · 39K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Post Type Rewrite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Custom Post Type Rewrite