
Author: BlackMelvyn Security & Risk Analysis
wordpress.org/plugins/duplicate-posts-erazerThis plugin prevents duplicate posts to be published, especially when running autoblogs.
Is Author: BlackMelvyn Safe to Use in 2026?
Generally Safe
Score 85/100Author: BlackMelvyn has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "duplicate-posts-erazer" v1.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface, with zero identified unprotected entry points. The code signals also indicate good practices, with no dangerous functions, no file operations, and no external HTTP requests. Furthermore, all identified output is properly escaped, and there are no recorded vulnerabilities or CVEs in its history.
However, the analysis reveals a critical concern: a single SQL query that does not utilize prepared statements. This is a significant risk, as it makes the plugin vulnerable to SQL injection attacks if the data used in this query originates from user input without proper sanitization. The lack of capability checks and nonce checks, while not directly leading to deductions due to the limited attack surface, are generally considered essential security measures for any plugin that interacts with the WordPress core or handles sensitive operations. The lack of any taint flow analysis might also mask potential vulnerabilities if complex data flows exist that were not detected by the static analysis tool.
In conclusion, while the plugin's limited attack surface and good output escaping are commendable, the presence of a raw SQL query is a notable weakness that requires immediate attention. The clean vulnerability history is a positive sign, suggesting a generally cautious development approach, but it doesn't negate the inherent risk of the unescaped SQL query. Addressing this specific issue should be the priority for improving the plugin's security.
Key Concerns
- Raw SQL query without prepared statements
Author: BlackMelvyn Security Vulnerabilities
Author: BlackMelvyn Code Analysis
SQL Query Safety
Author: BlackMelvyn Attack Surface
WordPress Hooks 1
Maintenance & Trust
Author: BlackMelvyn Maintenance & Trust
Maintenance Signals
Community Trust
Author: BlackMelvyn Alternatives
Duplicate and Auto Draft Cleaner
duplicate-and-auto-draft-cleaner
Clean auto-drafts and duplicate posts with manual controls, scheduled cleanup, activity logs, and safer delete confirmation.
Duplicate Post
copy-delete-posts
Duplicate post
Delete Duplicate Posts
delete-duplicate-posts
Get rid of duplicate posts and pages (any post type) on your blog with manual or automatic modes.
Clone Posts
clone-posts
Easily clone (duplicate) Posts, Pages and Custom Post Types, including their custom fields (post_meta)
Duplica – Duplicate Posts, Pages, Custom Posts or Users
duplica
Duplicate posts, pages or custom posts with a single click.
Author: BlackMelvyn Developer Profile
2 plugins · 120 total installs
How We Detect Author: BlackMelvyn
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
duplicate-posts-erazer/clearDuplicatePosts.php?ver=1.1