Downgrade Security & Risk Analysis

wordpress.org/plugins/downgrade

Downgrade WordPress

100 active installs v1.0.0 PHP + WP 4.9.4+ Updated Mar 24, 2018
coredowngraderollbackversionwp-core
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Downgrade Safe to Use in 2026?

Generally Safe

Score 85/100

Downgrade has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "downgrade" plugin version 1.0.0 exhibits a seemingly strong security posture based on the provided static analysis. There are no identified entry points (AJAX, REST API, shortcodes, cron events), which significantly limits the plugin's attack surface. Furthermore, the code does not utilize dangerous functions, all SQL queries are properly prepared, and there are no file operations or external HTTP requests. The absence of known vulnerabilities in its history is also a positive indicator.

However, the analysis does highlight areas of concern. A significant portion of the output (33%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if the unescaped output is rendered in a user-facing context. Additionally, the complete lack of nonce checks and capability checks across all potential, albeit absent, entry points suggests a potential gap in security best practices, even if there are no exploitable points currently. While the plugin has no historical vulnerabilities, this could be due to its limited functionality or recent release, rather than inherent robust security.

In conclusion, the "downgrade" plugin v1.0.0 appears to be built with some security considerations, particularly in its lack of direct exploitable entry points and use of prepared statements. Nevertheless, the unescaped output represents a tangible risk that requires attention. The absence of nonce and capability checks, while not immediately exploitable, is a weakness in defensive programming that could become a problem if functionality changes or new entry points are introduced.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Downgrade Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Downgrade Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Downgrade Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped3 total outputs
Attack Surface

Downgrade Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menudowngrade.php:34
actionadmin_initdowngrade.php:42
filterpre_site_option_update_coredowngrade.php:77
filtersite_transient_update_coredowngrade.php:78
Maintenance & Trust

Downgrade Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 24, 2018
PHP min version
Downloads17K

Community Trust

Rating60/100
Number of ratings2
Active installs100
Developer Profile

Downgrade Developer Profile

GraphicEdit

8 plugins · 650 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Downgrade

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="dg_specific_version_name"id="dg_specific_version_name"
FAQ

Frequently Asked Questions about Downgrade