Duplicate Post and Clone Page Security & Risk Analysis

wordpress.org/plugins/duplicate-post-and-clone-page

One click duplicate post and page. The best solution for easy copy page and post. It just works!

10 active installs v1.0.0 PHP 7.0+ WP 5.0+ Updated Unknown
copy-pagescopy-postsduplicate-pagesduplicate-postduplicate-posts
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Duplicate Post and Clone Page Safe to Use in 2026?

Generally Safe

Score 100/100

Duplicate Post and Clone Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "duplicate-post-and-clone-page" plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. It demonstrates excellent adherence to WordPress security best practices, with no dangerous functions, all SQL queries using prepared statements, and 100% of output properly escaped. The absence of file operations and the presence of robust nonce and capability checks on its two AJAX entry points further enhance its security. The plugin's clean vulnerability history, with no recorded CVEs, suggests a history of secure development and maintenance.

However, the plugin does make three external HTTP requests. While not explicitly flagged as a vulnerability in the static analysis, these requests represent a potential attack vector if the remote endpoints are compromised or malicious. The lack of taint analysis results (0 flows analyzed) is also a minor concern, as it implies a limited scope of analysis or potentially unanalyzed code paths that could hide vulnerabilities.

In conclusion, this plugin appears to be well-secured with no critical or high-severity vulnerabilities identified in the static analysis or historical data. The primary area for potential improvement lies in scrutinizing the security implications of its external HTTP requests and ensuring comprehensive taint analysis for any future updates.

Key Concerns

  • External HTTP requests present a potential vector
  • No taint analysis performed
Vulnerabilities
None known

Duplicate Post and Clone Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Duplicate Post and Clone Page Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
65 escaped
Nonce Checks
4
Capability Checks
5
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

100% escaped65 total outputs
Attack Surface

Duplicate Post and Clone Page Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_hto_sdk_v1_insightssdk\class-hto-sdk-v1.php:398
authwp_ajax_hto_sdk_v1_dismiss_noticesdk\class-hto-sdk-v1.php:399
WordPress Hooks 15
actionadmin_initclass.dpcp-settings.php:36
actionplugins_loadedduplicate-post-and-clone-page.php:79
actionadmin_menuduplicate-post-and-clone-page.php:93
actionadmin_enqueue_scriptsduplicate-post-and-clone-page.php:94
actionwp_enqueue_scriptsduplicate-post-and-clone-page.php:95
filterpost_row_actionsduplicate-post-and-clone-page.php:96
filterpage_row_actionsduplicate-post-and-clone-page.php:97
actionadmin_action_dpcp_duplicateduplicate-post-and-clone-page.php:98
actionadmin_action_dpcp_hide_tutorialduplicate-post-and-clone-page.php:99
actionadmin_noticesduplicate-post-and-clone-page.php:100
actionadmin_bar_menuduplicate-post-and-clone-page.php:101
actionin_admin_headersdk\class-hto-sdk-v1.php:388
actionadmin_enqueue_scriptssdk\class-hto-sdk-v1.php:397
actionadmin_noticessdk\class-hto-sdk-v1.php:523
actionplugins_loadedsdk\sdk-init.php:84
Maintenance & Trust

Duplicate Post and Clone Page Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedUnknown
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Duplicate Post and Clone Page Developer Profile

wpgenius9

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Duplicate Post and Clone Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/duplicate-post-and-clone-page/assets/css/frontend.css/wp-content/plugins/duplicate-post-and-clone-page/assets/css/admin.css
Version Parameters
duplicate-post-and-clone-page/assets/css/admin.css?ver=duplicate-post-and-clone-page/assets/css/frontend.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Duplicate Post and Clone Page