Author: BlackMelvyn Security & Risk Analysis

wordpress.org/plugins/duplicate-posts-erazer

This plugin prevents duplicate posts to be published, especially when running autoblogs.

80 active installs v1.1 PHP + WP 2.5+ Updated Feb 8, 2011
databaseduplicateduplicate-postspost-eraserpost-erazer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Author: BlackMelvyn Safe to Use in 2026?

Generally Safe

Score 85/100

Author: BlackMelvyn has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "duplicate-posts-erazer" v1.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface, with zero identified unprotected entry points. The code signals also indicate good practices, with no dangerous functions, no file operations, and no external HTTP requests. Furthermore, all identified output is properly escaped, and there are no recorded vulnerabilities or CVEs in its history.

However, the analysis reveals a critical concern: a single SQL query that does not utilize prepared statements. This is a significant risk, as it makes the plugin vulnerable to SQL injection attacks if the data used in this query originates from user input without proper sanitization. The lack of capability checks and nonce checks, while not directly leading to deductions due to the limited attack surface, are generally considered essential security measures for any plugin that interacts with the WordPress core or handles sensitive operations. The lack of any taint flow analysis might also mask potential vulnerabilities if complex data flows exist that were not detected by the static analysis tool.

In conclusion, while the plugin's limited attack surface and good output escaping are commendable, the presence of a raw SQL query is a notable weakness that requires immediate attention. The clean vulnerability history is a positive sign, suggesting a generally cautious development approach, but it doesn't negate the inherent risk of the unescaped SQL query. Addressing this specific issue should be the priority for improving the plugin's security.

Key Concerns

  • Raw SQL query without prepared statements
Vulnerabilities
None known

Author: BlackMelvyn Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Author: BlackMelvyn Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

Author: BlackMelvyn Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionpublish_postclearDuplicatePosts.php:22
Maintenance & Trust

Author: BlackMelvyn Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedFeb 8, 2011
PHP min version
Downloads40K

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

Author: BlackMelvyn Developer Profile

blackmelvyn

2 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Author: BlackMelvyn

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
duplicate-posts-erazer/clearDuplicatePosts.php?ver=1.1

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Author: BlackMelvyn