easy repeater Security & Risk Analysis

wordpress.org/plugins/easy-repeater

easy repeater is a small wordpress plugin to repeat fields and making dynamic content easy way.

10 active installs v2.0.2 PHP + WP 4.0.0+ Updated Feb 10, 2016
dynamic-fieldsrepeaterrepeatingrepeating-fieldstext-fields
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is easy repeater Safe to Use in 2026?

Generally Safe

Score 85/100

easy repeater has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "easy-repeater" v2.0.2 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for all SQL queries, indicating a strong defense against SQL injection. Furthermore, there's a history of zero known vulnerabilities, suggesting a relatively stable and secure codebase over time. However, the static analysis reveals significant areas of concern.

The plugin has a single identified entry point via an AJAX handler that lacks authentication checks. This is a critical weakness, as it allows any user, including unauthenticated ones, to potentially interact with this handler. The presence of the `unserialize` function, a known dangerous function often associated with deserialization vulnerabilities, further heightens this risk, especially when combined with an unprotected entry point. While no critical or high-severity taint flows were detected, the two analyzed flows with unsanitized paths warrant attention, as they could potentially lead to vulnerabilities if the data source is untrusted.

In conclusion, while the plugin avoids common pitfalls like raw SQL queries and has a clean vulnerability history, the unprotected AJAX handler and the use of `unserialize` represent significant security risks that need immediate attention. The lack of robust authentication on this entry point makes it a prime target for exploitation, and the potential for deserialization vulnerabilities adds another layer of concern. The plugin has strengths in its SQL handling and historical stability, but these are overshadowed by the identified entry point vulnerabilities.

Key Concerns

  • AJAX handler without authentication check
  • Dangerous function: unserialize
  • Flows with unsanitized paths
  • Low percentage of properly escaped output
Vulnerabilities
None known

easy repeater Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

easy repeater Release Timeline

v2.0.2Current
v2.0.1
v2.0
Code Analysis
Analyzed Mar 16, 2026

easy repeater Code Analysis

Dangerous Functions
6
Raw SQL Queries
0
0 prepared
Unescaped Output
159
20 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$get_array_post = unserialize($get_array_post);easy-metabox.php:24
unserialize$dat = unserialize($dat);easy-metabox.php:109
unserialize$classes = unserialize($post_class);easy-metabox.php:157
unserialize$get_easy_fields = unserialize( $dat );easy-reapeater.php:71
unserialize$dat = unserialize($dat);options_admin.php:150
unserialize$get_array_post = unserialize($get_array_post);options_admin.php:279

Output Escaping

11% escaped179 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
easy_repeater_action_callback (easy-reapeater.php:93)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

easy repeater Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_my_actioneasy-reapeater.php:92
WordPress Hooks 12
actionload-post.phpeasy-metabox.php:8
actionload-post-new.phpeasy-metabox.php:9
actionadd_meta_boxeseasy-metabox.php:15
actionsave_posteasy-metabox.php:16
actioncurrent_screeneasy-reapeater.php:57
actionadmin_enqueue_scriptseasy-reapeater.php:63
actioniniteasy-reapeater.php:89
actionadmin_menuoptions_admin.php:13
actionadmin_menuoptions_admin.php:14
actionadmin_initoptions_admin.php:23
actionadmin_initoptions_admin.php:33
actionadmin_bar_menuoptions_admin.php:35
Maintenance & Trust

easy repeater Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 10, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

easy repeater Developer Profile

shokry055

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect easy repeater

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easy-repeater/css/easy-repeater-admin.css/wp-content/plugins/easy-repeater/css/rtl.css/wp-content/plugins/easy-repeater/js/easy-repeater-js.js
Script Paths
/wp-content/plugins/easy-repeater/js/easy-repeater-js.js
Version Parameters
easy-repeater/css/easy-repeater-admin.css?ver=easy-repeater/css/rtl.css?ver=easy-repeater/js/easy-repeater-js.js?ver=

HTML / DOM Fingerprints

CSS Classes
easy-repeater-class-idmain-tile-inputblock-headexpandmoveoptions-holderoh
Data Attributes
name="reapeter_meta_id"name="repeat_main_array_save"
JS Globals
pluginurlpathnxmax_fieldsajax_object
Shortcode Output
<input class="main-tile-input" type="text" value="block title ..." name="
FAQ

Frequently Asked Questions about easy repeater