Delete All Pending Comments Security & Risk Analysis

wordpress.org/plugins/delete-all-pending-comments

Delete all pending comments from your database easily.

100 active installs v1.0 PHP + WP 3+ Updated Jan 22, 2013
commentcommentspendingspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Delete All Pending Comments Safe to Use in 2026?

Generally Safe

Score 85/100

Delete All Pending Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The plugin 'delete-all-pending-comments' v1.0 demonstrates a mixed security posture. On the positive side, it has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, all of which are typically entry points for attackers. Furthermore, there are no recorded vulnerabilities (CVEs) in its history, suggesting a history of stable and potentially secure code. The presence of nonce checks, even if limited, is a good practice. However, significant concerns arise from the static analysis of its code. All SQL queries are performed without prepared statements, creating a high risk of SQL injection vulnerabilities. Additionally, none of the 12 output operations are properly escaped, opening the door to Cross-Site Scripting (XSS) attacks. The absence of capability checks is also a notable weakness, as it means that any logged-in user, regardless of their role, could potentially trigger plugin functionality if an entry point were discovered.

While the plugin's attack surface is minimal and it has no vulnerability history, the direct risks of SQL injection and XSS stemming from the unescaped output and raw SQL queries are substantial. The lack of capability checks further exacerbates this by not enforcing authorization. The plugin's strengths lie in its limited exposure and clean history, but its implementation flaws in handling data and queries present clear and present dangers that need immediate attention. A small attack surface is negated by critical vulnerabilities within the code itself.

Key Concerns

  • Raw SQL queries without prepared statements
  • Unescaped output operations
  • Missing capability checks on entry points
Vulnerabilities
None known

Delete All Pending Comments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Delete All Pending Comments Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped12 total outputs
Attack Surface

Delete All Pending Comments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_enqueue_scriptsdapc.php:88
actionadmin_menudapc.php:89
Maintenance & Trust

Delete All Pending Comments Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 22, 2013
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

Delete All Pending Comments Developer Profile

Gravuj Miklos Henrich

5 plugins · 150 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Delete All Pending Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/delete-all-pending-comments/dapc.css
Version Parameters
delete-all-pending-comments/dapc.css?ver=

HTML / DOM Fingerprints

CSS Classes
small_dapcbutton-checkbox
Data Attributes
name="dapc_form"name="dapc"name="delete"
FAQ

Frequently Asked Questions about Delete All Pending Comments