Plugin Mover Security & Risk Analysis

wordpress.org/plugins/plugin-mover

Easily move your plugins into another folder!

10 active installs v1.1 PHP + WP 4.7+ Updated Jan 28, 2021
adminmanagement
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Plugin Mover Safe to Use in 2026?

Generally Safe

Score 85/100

Plugin Mover has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin-mover v1.1 plugin exhibits a mixed security posture. On one hand, it demonstrates good practices by having a zero attack surface for common entry points like AJAX handlers, REST API routes, and shortcodes, and all SQL queries are performed using prepared statements. This suggests an effort to prevent common injection vulnerabilities. However, there are significant concerns regarding output escaping and file operations.

A critical weakness identified is the complete lack of output escaping (0% properly escaped). This means that any data processed by the plugin and displayed back to users or within the WordPress environment is susceptible to cross-site scripting (XSS) attacks. Furthermore, while there are no external HTTP requests or dangerous functions, the presence of two file operations with unsanitized paths in the taint analysis is a serious concern. This could lead to arbitrary file read or write vulnerabilities, allowing an attacker to access or modify sensitive files on the server.

The plugin's vulnerability history is clean, with no known CVEs. This is a positive indicator, but it does not negate the risks identified in the static analysis. The absence of historical vulnerabilities could be due to the plugin's obscurity, lack of targeted attacks, or simply that the current code has not been exhaustively audited for these specific issues. Overall, while the plugin avoids some common pitfalls, the severe output escaping and file operation vulnerabilities present a substantial risk that needs immediate attention.

Key Concerns

  • Unsanitized paths in taint flows
  • No output escaping
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Plugin Mover Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plugin Mover Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
plugin_move_page (plugin-mover-admin-page.php:8)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Plugin Mover Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterbulk_actions-pluginsplugin-mover.php:51
actionadmin_menuplugin-mover.php:52
filterhandle_bulk_actions-pluginsplugin-mover.php:53
actionadmin_noticesplugin-mover.php:54
Maintenance & Trust

Plugin Mover Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedJan 28, 2021
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Plugin Mover Developer Profile

theode

11 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plugin Mover

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
Move to
FAQ

Frequently Asked Questions about Plugin Mover