Hindi-To-Lat Security & Risk Analysis

wordpress.org/plugins/hindi-to-lat

Converts Hindi characters in post, page and term slugs to Latin characters.

500 active installs v1.0 PHP 7.2+ WP 4.6+ Updated Sep 2, 2020
cyr2lathi2lathindi-to-lathindi-to-latinslugs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hindi-To-Lat Safe to Use in 2026?

Generally Safe

Score 85/100

Hindi-To-Lat has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The static analysis of the "hindi-to-lat" v1.0 plugin reveals a remarkably clean code base with no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no dangerous functions, file operations, external HTTP requests, or bundled libraries. The code also demonstrates 100% proper output escaping and has no recorded vulnerability history. This suggests a strong adherence to secure coding practices by the developers, particularly in preventing common web vulnerabilities like cross-site scripting (XSS) and basic unauthorized access vectors.

However, the analysis does highlight a significant concern regarding SQL queries. With three SQL queries present and none utilizing prepared statements, this plugin is highly susceptible to SQL injection vulnerabilities. This is a critical oversight that can lead to serious data breaches and unauthorized modifications. While the plugin has no recorded vulnerability history, the absence of prepared statements represents a substantial inherent risk that needs immediate attention.

In conclusion, the "hindi-to-lat" v1.0 plugin exhibits excellent security in many areas, particularly in its limited attack surface and robust output escaping. Nevertheless, the lack of prepared statements for all SQL queries presents a critical security flaw that significantly lowers its overall security posture. The absence of past vulnerabilities is positive but does not negate the present risk posed by unparameterized SQL queries.

Key Concerns

  • Raw SQL queries without prepared statements
Vulnerabilities
None known

Hindi-To-Lat Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hindi-To-Lat Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries
Attack Surface

Hindi-To-Lat Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtersanitize_titlehindi-to-lat.php:498
filtersanitize_file_namehindi-to-lat.php:499
actionshutdownhindi-to-lat.php:525
Maintenance & Trust

Hindi-To-Lat Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedSep 2, 2020
PHP min version7.2
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs500
Developer Profile

Hindi-To-Lat Developer Profile

Dilip Soni

1 plugin · 500 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hindi-To-Lat

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Hindi-To-Lat