DupZap Security & Risk Analysis

wordpress.org/plugins/dupzap

Clone posts, pages, and custom post types with one click. Lightweight and intuitive!

10 active installs v1.0.0 PHP 7.4+ WP 6.2+ Updated Jul 29, 2025
clonecopyduplicatepagesposts
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is DupZap Safe to Use in 2026?

Generally Safe

Score 100/100

DupZap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "dupzap" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. It demonstrates excellent practices by ensuring all SQL queries use prepared statements and all output is properly escaped. The absence of file operations and external HTTP requests further reduces its attack surface. The presence of nonce and capability checks in the code, along with no recorded vulnerabilities in its history, suggests a developer who is conscious of security best practices.

However, a notable concern arises from the presence of one unprotected AJAX handler. This represents a direct entry point into the plugin's functionality that an attacker could potentially exploit without requiring any authentication. While no specific vulnerabilities are identified in the taint analysis or known CVEs, this unprotected endpoint remains a potential weakness. The plugin's limited attack surface and good adherence to other security measures are positive, but this single unprotected entry point warrants attention.

In conclusion, "dupzap" v1.0.0 is a plugin with a good foundation for security, characterized by secure coding practices in data handling and output. The primary weakness lies in an unprotected AJAX endpoint, which is a direct risk. The clean vulnerability history is a positive indicator, but it does not negate the risk posed by the identified unprotected entry point. Addressing this specific issue would significantly bolster the plugin's overall security.

Key Concerns

  • Unprotected AJAX handler
Vulnerabilities
None known

DupZap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

DupZap Release Timeline

v1.0.0Current
Code Analysis
Analyzed Mar 17, 2026

DupZap Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
3
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Attack Surface
1 unprotected

DupZap Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 2

authwp_ajax_dupzap_duplicatedupzap.php:40
authwp_ajax_dupzap_duplicateincludes\class-dupzap-core.php:6
WordPress Hooks 7
actionplugins_loadeddupzap.php:38
filterpost_row_actionsincludes\class-dupzap-admin.php:4
filterpage_row_actionsincludes\class-dupzap-admin.php:5
actionadd_meta_boxesincludes\class-dupzap-admin.php:6
actionadmin_enqueue_scriptsincludes\class-dupzap-admin.php:7
actionadmin_noticesincludes\class-dupzap-admin.php:8
actionadmin_action_dupzap_duplicateincludes\class-dupzap-core.php:5
Maintenance & Trust

DupZap Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 29, 2025
PHP min version7.4
Downloads280

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

DupZap Developer Profile

TAKAHIRO

6 plugins · 70 total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DupZap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dupzap/js/dupzap-admin.js
Script Paths
/wp-content/plugins/dupzap/js/dupzap-admin.js
Version Parameters
dupzap-admin=1.0.0

HTML / DOM Fingerprints

CSS Classes
dupzap-clone-button
Data Attributes
data-post-id
JS Globals
dupzap
FAQ

Frequently Asked Questions about DupZap