DupleXer – Post Duplicator Security & Risk Analysis

wordpress.org/plugins/duplexer-post-duplicator

DupleXer is a simple plugin that allows you to duplicate posts, pages, and WooCommerce products with one click.

0 active installs v1.0.0 PHP 7.0+ WP 5.0+ Updated May 12, 2025
duplicatepagepost
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is DupleXer – Post Duplicator Safe to Use in 2026?

Generally Safe

Score 100/100

DupleXer – Post Duplicator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The static analysis of duplexer-post-duplicator v1.0.0 reveals a generally strong security posture. The plugin demonstrates good practices by implementing nonce checks and capability checks, and all identified SQL queries are prepared. Furthermore, all output is properly escaped, and there are no identified file operations or external HTTP requests. The absence of known CVEs and a clear vulnerability history reinforces this positive outlook.

However, the taint analysis highlights a potential area of concern. While no critical or high-severity flows were detected, there are two flows with unsanitized paths. This indicates that user-supplied input might be processed in a way that could lead to vulnerabilities if not handled carefully downstream, even if current mitigation prevents immediate exploitation. The lack of any detected attack surface points (AJAX, REST API, shortcodes, cron) is also notable, suggesting limited interaction points which inherently reduces risk.

In conclusion, duplexer-post-duplicator v1.0.0 appears to be a well-secured plugin with a solid foundation of security best practices. The main area to monitor is the presence of unsanitized paths in the taint analysis, which warrants further investigation to ensure no latent vulnerabilities exist. The plugin's clean vulnerability history and lack of known exploits are significant strengths.

Key Concerns

  • Flows with unsanitized paths found
Vulnerabilities
None known

DupleXer – Post Duplicator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

DupleXer – Post Duplicator Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
duplicate_post (includes\class-admin-hooks.php:21)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DupleXer – Post Duplicator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedduplexer.php:28
actionpost_row_actionsincludes\class-admin-hooks.php:9
actionpage_row_actionsincludes\class-admin-hooks.php:10
actionadmin_action_duplexer_duplicate_postincludes\class-admin-hooks.php:11
Maintenance & Trust

DupleXer – Post Duplicator Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 12, 2025
PHP min version7.0
Downloads250

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

DupleXer – Post Duplicator Developer Profile

whizPlugins

3 plugins · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DupleXer – Post Duplicator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/duplexer-post-duplicator/assets/css/style.css/wp-content/plugins/duplexer-post-duplicator/assets/js/script.js
Script Paths
/wp-content/plugins/duplexer-post-duplicator/assets/js/script.js
Version Parameters
duplexer-post-duplicator/assets/css/style.css?ver=duplexer-post-duplicator/assets/js/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about DupleXer – Post Duplicator