FileRenameReplace Security & Risk Analysis

wordpress.org/plugins/filerenamereplace

This plugin let the user renaming or replacing files without breaking links.

20 active installs v1.0 PHP 5.6.0+ WP 4.0+ Updated May 12, 2018
imagesrenamereplace
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FileRenameReplace Safe to Use in 2026?

Generally Safe

Score 85/100

FileRenameReplace has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "filerenamereplace" plugin version 1.0 exhibits a generally good security posture, largely due to the absence of known vulnerabilities and a lack of significant identified risks in static analysis. The plugin does not expose any AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks, indicating a minimal attack surface. Furthermore, all SQL queries are properly prepared, and there are no identified taint flows with unsanitized paths or critical/high severities. This suggests a developer mindful of common web application security pitfalls.

However, a notable concern arises from the low percentage of properly escaped output (6%). With 17 total outputs, only about one is properly escaped, leaving a significant portion potentially vulnerable to Cross-Site Scripting (XSS) attacks if any user-supplied data is included in these unescaped outputs. The presence of file operations, while not inherently dangerous, warrants careful consideration given the lack of robust output escaping.

Given the plugin's history of zero recorded CVEs, it indicates a potentially stable and secure code base. Nevertheless, the significant lack of output escaping is a critical weakness that could be exploited. While the plugin appears to be strong in other areas, this specific oversight presents a clear area of risk that needs to be addressed.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

FileRenameReplace Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FileRenameReplace Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
16
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

6% escaped17 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
media_bulk_action (FileMetadataModifier.php:47)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

FileRenameReplace Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuFileMetadataModifier.php:21
actionadmin_head-upload.phpFileMetadataModifier.php:22
filtermedia_row_actionsFileMetadataModifier.php:23
actionadmin_action_bulk_filerenamereplaceFileMetadataModifier.php:24
actionattachment_submitbox_misc_actionsFileMetadataModifier.php:25
actioninitFileMetadataModifier.php:153
Maintenance & Trust

FileRenameReplace Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 12, 2018
PHP min version5.6.0
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs20
Developer Profile

FileRenameReplace Developer Profile

Albin

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FileRenameReplace

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/filerenamereplace/js/filerenamereplace-upload.js

HTML / DOM Fingerprints

CSS Classes
misc-pub-file-meta-modifier
Data Attributes
data-file-iddata-post-datedata-file-pathdata-file-name
JS Globals
fileRenameReplaceGlobal
FAQ

Frequently Asked Questions about FileRenameReplace