Plagiary Search Security & Risk Analysis

wordpress.org/plugins/plagiary-search

Find websites that copy/paste your content without authorization.

10 active installs v1.2.2 PHP + WP 3.0+ Updated Apr 18, 2016
contentcopy-protectiondetectionplagiarismplagiary
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Plagiary Search Safe to Use in 2026?

Generally Safe

Score 85/100

Plagiary Search has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "plagiary-search" v1.2.2 plugin exhibits a concerning security posture due to a significant number of unprotected AJAX entry points and the presence of dangerous functions. While the plugin has no recorded vulnerability history, this does not guarantee its current safety. The static analysis reveals a substantial attack surface with 20 AJAX handlers, all of which lack authentication checks, presenting a high risk of unauthorized actions. Furthermore, the use of dangerous functions like `unserialize` and `exec` opens the door to potential code injection or other severe vulnerabilities if user-supplied data is not rigorously sanitized before being passed to these functions. The taint analysis indicates 7 high-severity flows with unsanitized paths, directly correlating with the risks posed by the unprotected entry points and dangerous functions.

Key Concerns

  • 20 AJAX handlers without auth checks
  • 7 high severity taint flows with unsanitized paths
  • Dangerous functions: unserialize, exec
  • Only 5% of outputs properly escaped
  • Only 2 capability checks across the plugin
  • Nonce checks missing on AJAX handlers
  • 36% of SQL queries not using prepared statements
Vulnerabilities
None known

Plagiary Search Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plagiary Search Code Analysis

Dangerous Functions
6
Raw SQL Queries
23
13 prepared
Unescaped Output
381
19 escaped
Nonce Checks
0
Capability Checks
2
File Operations
79
External Requests
8
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize(@file_get_contents(dirname(__FILE__)."/data/SLFramework_OtherPlugins_".date('core\otherplugins.class.php:48
unserialize$res = unserialize($request['body']);core\otherplugins.class.php:128
unserialize$res = unserialize($request['body']);core\otherplugins.class.php:176
exec$str = exec($command, $output, $return) ;plagiary-search.php:676
unserialize$content = @unserialize(@file_get_contents(WP_CONTENT_DIR."/sedlex/plagiary-search/".$blog_fold.$f))plagiary-search.php:821
unserialize$content = @unserialize(@file_get_contents(WP_CONTENT_DIR."/sedlex/plagiary-search/".$blog_fold.$f))plagiary-search.php:857

SQL Query Safety

36% prepared36 total queries

Output Escaping

5% escaped400 total outputs
Data Flows
17 unsanitized

Data Flow Analysis

17 flows17 with unsanitized paths
flush (core\admin_table.class.php:170)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
20 unprotected

Plagiary Search Attack Surface

Entry Points20
Unprotected20

AJAX Handlers 20

authwp_ajax_translate_addcore.class.php:85
authwp_ajax_translate_modifycore.class.php:86
authwp_ajax_translate_createcore.class.php:87
authwp_ajax_send_translationcore.class.php:88
authwp_ajax_update_summarycore.class.php:89
authwp_ajax_del_paramcore.class.php:92
authwp_ajax_add_paramcore.class.php:93
authwp_ajax_send_feedbackcore.class.php:96
authwp_ajax_notPlagiaryplagiary-search.php:56
authwp_ajax_plagiaryplagiary-search.php:57
authwp_ajax_notAuthorizedplagiary-search.php:58
authwp_ajax_authorizedplagiary-search.php:59
authwp_ajax_delete_copyplagiary-search.php:60
authwp_ajax_viewTextplagiary-search.php:62
authwp_ajax_forceSearchPlagiaryplagiary-search.php:64
authwp_ajax_stopPlagiaryplagiary-search.php:65
authwp_ajax_forceSearchSpecificPlagiaryplagiary-search.php:66
authwp_ajax_stopSpecificPlagiaryplagiary-search.php:67
noprivwp_ajax_checkIfProcessNeededplagiary-search.php:69
authwp_ajax_checkIfProcessNeededplagiary-search.php:70
WordPress Hooks 26
actioninitcore.class.php:50
actionparse_requestcore.class.php:51
actionadmin_menucore.class.php:53
filterplugin_row_metacore.class.php:54
filterplugin_action_linkscore.class.php:55
actioninitcore.class.php:56
actioninitcore.class.php:58
actionwp_enqueue_scriptscore.class.php:61
actionwp_enqueue_scriptscore.class.php:62
actionwp_enqueue_scriptscore.class.php:64
actionwp_enqueue_scriptscore.class.php:67
actionwp_enqueue_scriptscore.class.php:69
actionwp_enqueue_scriptscore.class.php:70
actionadmin_enqueue_scriptscore.class.php:73
actionadmin_enqueue_scriptscore.class.php:74
actionadmin_enqueue_scriptscore.class.php:76
actionadmin_enqueue_scriptscore.class.php:79
actionadmin_enqueue_scriptscore.class.php:81
actionadmin_enqueue_scriptscore.class.php:82
filterthe_contentcore.class.php:99
filterget_the_excerptcore.class.php:100
filterget_the_excerptcore.class.php:101
actionactivated_plugincore.class.php:104
filtermce_external_pluginscore.class.php:702
filtermce_buttonscore.class.php:703
filtertiny_mce_versioncore.class.php:704
Maintenance & Trust

Plagiary Search Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 18, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Plagiary Search Developer Profile

KaizenCoders

14 plugins · 31K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
153 days
View full developer profile
Detection Fingerprints

How We Detect Plagiary Search

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Plugin Name: My Plugin Plugin Tag: tag Description: <p>The description of the plugin on this line. </p> Version: 1.0.0 Framework: SL_Framework Author: The name of the author Author URI: http://www.yourdomain.com/ Author Email: youremail@yourdomain.com Framework Email: sedlex@sedlex.fr Plugin URI: http://wordpress.org/plugins/my-plugin/ License: GPL3 -->==================================================================================================================================================== Plugin initialization @return void==================================================================================================================================================== In order to uninstall the plugin, few things are to be done ... (do not modify this function) @return void==================================================================================================================================================== Function called when the plugin is activated For instance, you can do stuff regarding the update of the format of the database if needed If you do not need this function, you may delete it. @return void+6 more
FAQ

Frequently Asked Questions about Plagiary Search