Dooplee Duplicate Content Checker Security & Risk Analysis

wordpress.org/plugins/dooplee-duplicate-content-checker

Fight content theft and check for scrapers using your content for SEO and harming your rank. This plugin includes a search in the admin area you use t …

10 active installs v1.0 PHP + WP 3.0+ Updated Jan 28, 2012
contentduplicate-contentgooglegoogle-seoseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dooplee Duplicate Content Checker Safe to Use in 2026?

Generally Safe

Score 85/100

Dooplee Duplicate Content Checker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'dooplee-duplicate-content-checker' plugin v1.0 presents a mixed security posture. On the positive side, the static analysis reveals a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no detected dangerous functions, SQL queries are exclusively prepared, and no external HTTP requests or file operations are performed. This suggests a generally well-contained plugin. However, a significant concern arises from the complete lack of output escaping, with 100% of identified outputs being unescaped. This leaves the plugin vulnerable to Cross-Site Scripting (XSS) attacks where user-controlled data is displayed without proper sanitization. The absence of nonce checks and capability checks on any entry points (though there are none identified) also indicates a potential gap in security best practices if such entry points were to be added in the future. The plugin's vulnerability history is clean, with no recorded CVEs, which is positive, but this cannot compensate for the critical flaw in output handling found in the code analysis.

Key Concerns

  • All outputs are unescaped
  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Dooplee Duplicate Content Checker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dooplee Duplicate Content Checker Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 17, 2026

Dooplee Duplicate Content Checker Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Dooplee Duplicate Content Checker Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menu1.1\dooplee.php:15
actionadmin_menudooplee.php:15
Maintenance & Trust

Dooplee Duplicate Content Checker Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedJan 28, 2012
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Dooplee Duplicate Content Checker Developer Profile

Lysis10

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dooplee Duplicate Content Checker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dooplee-duplicate-content-checker/styles.css

HTML / DOM Fingerprints

CSS Classes
mainerror_messagesarticlelisttitle_<?php the_ID(); ?>searchdivreport
Data Attributes
id="main"id="error_messages"id="articlelist"id="title_<?php the_ID(); ?>"id="link_<?php the_ID(); ?>"id="post_<?php the_ID(); ?>"+18 more
JS Globals
currentDivcheckDupsfilloutForm
FAQ

Frequently Asked Questions about Dooplee Duplicate Content Checker