
Move Comments Security & Risk Analysis
wordpress.org/plugins/move-commentsThis plugin allows you to move comments between posts in a simple and easy way by adding a page under (\'Move\') under the \'Comments\& …
Is Move Comments Safe to Use in 2026?
Generally Safe
Score 85/100Move Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "move-comments" plugin v2.4 presents a generally positive security posture based on the provided static analysis. The plugin exhibits an extremely small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that could serve as entry points for attackers. Furthermore, there are no indications of dangerous functions being used, external HTTP requests, or file operations, which are common vectors for exploitation. The absence of any known CVEs or historical vulnerabilities further strengthens this assessment, suggesting a development team that prioritizes security or has been fortunate to avoid exploitation.
However, there are significant concerns within the code analysis. A critical weakness lies in the complete lack of output escaping, meaning any data processed by the plugin and displayed to users or within the WordPress admin area could be susceptible to Cross-Site Scripting (XSS) attacks. Additionally, the fact that 80% of SQL queries are not using prepared statements poses a risk of SQL injection vulnerabilities, especially if any of the input data used in these queries is not properly sanitized. The absence of nonce checks and capability checks on any potential (though currently zero) entry points is also a concern, as these are fundamental security mechanisms for WordPress plugins.
In conclusion, while the plugin's minimal attack surface and lack of historical vulnerabilities are strengths, the current code analysis reveals serious potential weaknesses. The lack of output escaping and the heavy reliance on un-prepared SQL statements are significant risks that could be exploited. It is crucial that these identified code-level issues are addressed to improve the overall security of the "move-comments" plugin.
Key Concerns
- 80% of SQL queries not using prepared statements
- 0% of total outputs properly escaped
- 0 Nonce checks on potential entry points
- 0 Capability checks on potential entry points
Move Comments Security Vulnerabilities
Move Comments Code Analysis
SQL Query Safety
Output Escaping
Move Comments Attack Surface
WordPress Hooks 1
Maintenance & Trust
Move Comments Maintenance & Trust
Maintenance Signals
Community Trust
Move Comments Alternatives
Smart Bulk Delete & Content Cleaner for WordPress
smart-bulk-content-remover
Safely bulk delete posts, pages, media, and comments with flexible filters and a clean interface.
Contentpress
contentpress
Omegatheme ContentPress is a plugin for Wordpress that users worldwide love to use!
Disable Comments – Remove Comments & Stop Spam [Multi-Site Support]
disable-comments
Allows administrators to globally disable comments on their site. Comments can be disabled according to post type. Multisite friendly.
Title Remover
title-remover
Gives you the ability to hide the title of any post, page or custom post type item without affecting menus or titles in the admin area.
No Page Comment
no-page-comment
An admin interface to control the default comment and trackback settings on new posts, pages and custom post types.
Move Comments Developer Profile
2 plugins · 150 total installs
How We Detect Move Comments
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/move-comments/moco-common.css/wp-content/plugins/move-comments/moco-common.js/wp-content/plugins/move-comments/moco-common.jsmove-comments/moco-common.css?ver=move-comments/moco-common.js?ver=HTML / DOM Fingerprints
alternatename="move-comments"name="source_post_id"name="move_comment_id"name="target_post_id"MoveComments