
easy repeater Security & Risk Analysis
wordpress.org/plugins/easy-repeatereasy repeater is a small wordpress plugin to repeat fields and making dynamic content easy way.
Is easy repeater Safe to Use in 2026?
Generally Safe
Score 85/100easy repeater has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "easy-repeater" v2.0.2 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for all SQL queries, indicating a strong defense against SQL injection. Furthermore, there's a history of zero known vulnerabilities, suggesting a relatively stable and secure codebase over time. However, the static analysis reveals significant areas of concern.
The plugin has a single identified entry point via an AJAX handler that lacks authentication checks. This is a critical weakness, as it allows any user, including unauthenticated ones, to potentially interact with this handler. The presence of the `unserialize` function, a known dangerous function often associated with deserialization vulnerabilities, further heightens this risk, especially when combined with an unprotected entry point. While no critical or high-severity taint flows were detected, the two analyzed flows with unsanitized paths warrant attention, as they could potentially lead to vulnerabilities if the data source is untrusted.
In conclusion, while the plugin avoids common pitfalls like raw SQL queries and has a clean vulnerability history, the unprotected AJAX handler and the use of `unserialize` represent significant security risks that need immediate attention. The lack of robust authentication on this entry point makes it a prime target for exploitation, and the potential for deserialization vulnerabilities adds another layer of concern. The plugin has strengths in its SQL handling and historical stability, but these are overshadowed by the identified entry point vulnerabilities.
Key Concerns
- AJAX handler without authentication check
- Dangerous function: unserialize
- Flows with unsanitized paths
- Low percentage of properly escaped output
easy repeater Security Vulnerabilities
easy repeater Release Timeline
easy repeater Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
easy repeater Attack Surface
AJAX Handlers 1
WordPress Hooks 12
Maintenance & Trust
easy repeater Maintenance & Trust
Maintenance Signals
Community Trust
easy repeater Alternatives
Advanced Custom Fields (ACF®)
advanced-custom-fields
ACF helps customize WordPress with powerful, professional and intuitive fields. Proudly powering over 2 million sites, WordPress developers love ACF.
Contact Form 7 – Repeatable Fields
cf7-repeatable-fields
Adds repeatable groups of fields to Contact Form 7.
Advanced Custom Fields Repeater & Flexible Content Fields Collapser
advanced-custom-field-repeater-collapser
Easier sorting for large repeated fields in the Advanced Custom Fields plugin.
ACF Repeater & Flexible Content Collapser
acf-repeater-flexible-content-collapser
Collapse and expand ACF Repeater and Flexible Content fields all at once to get a better overview and enable easier sorting.
ACF Clone Repeater
acf-clone-repeater
ACF Pro 5.9 comes with a duplicate row feature on its own.
easy repeater Developer Profile
2 plugins · 20 total installs
How We Detect easy repeater
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/easy-repeater/css/easy-repeater-admin.css/wp-content/plugins/easy-repeater/css/rtl.css/wp-content/plugins/easy-repeater/js/easy-repeater-js.js/wp-content/plugins/easy-repeater/js/easy-repeater-js.jseasy-repeater/css/easy-repeater-admin.css?ver=easy-repeater/css/rtl.css?ver=easy-repeater/js/easy-repeater-js.js?ver=HTML / DOM Fingerprints
easy-repeater-class-idmain-tile-inputblock-headexpandmoveoptions-holderohname="reapeter_meta_id"name="repeat_main_array_save"pluginurlpathnxmax_fieldsajax_object<input class="main-tile-input" type="text" value="block title ..." name="