Post Duplicator Plus Security & Risk Analysis

wordpress.org/plugins/post-duplicator-plus

Duplicate a post or page with one click. Simple plugin. Just a few lines of code.

200 active installs v1.0.1 PHP 5.2.4+ WP + Updated Apr 16, 2023
adminposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Duplicator Plus Safe to Use in 2026?

Generally Safe

Score 85/100

Post Duplicator Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "post-duplicator-plus" v1.0.1 plugin exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The complete absence of exploitable entry points like AJAX handlers, REST API routes, and shortcodes, coupled with 100% secure coding practices in SQL queries and output escaping, indicates a highly robust development approach. The presence of a nonce check further reinforces this good practice. The plugin's vulnerability history is equally impressive, with zero recorded CVEs of any severity, suggesting a mature and well-maintained codebase that has historically avoided common security pitfalls.

While the static analysis reveals no immediate flaws, it's important to note that the analysis itself is based on the data provided. The absence of critical or high-severity taint flows, dangerous functions, file operations, or external HTTP requests further solidifies the plugin's clean bill of health. The zero recorded vulnerabilities and the lack of any common vulnerability types are significant strengths, implying a proactive approach to security throughout its development and maintenance lifecycle. This plugin, according to the data, appears to be a very safe choice for WordPress users.

In conclusion, the "post-duplicator-plus" v1.0.1 plugin demonstrates excellent security hygiene. The comprehensive static analysis shows no exploitable attack surface and adherence to secure coding standards. The clean vulnerability history is a strong indicator of ongoing security diligence. While no software is entirely risk-free, the data presented here suggests a minimal security risk associated with this plugin, highlighting its strengths in secure development and maintenance.

Vulnerabilities
None known

Post Duplicator Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Duplicator Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Post Duplicator Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterpost_row_actionsincludes\class-plugin-post-duplicator-plus.php:7
filterpage_row_actionsincludes\class-plugin-post-duplicator-plus.php:8
filteradmin_initincludes\class-plugin-post-duplicator-plus.php:9
Maintenance & Trust

Post Duplicator Plus Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedApr 16, 2023
PHP min version5.2.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Post Duplicator Plus Developer Profile

wptasker

3 plugins · 1K total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Duplicator Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<a href=".*duplicate_post_id=[0-9]*&_wpnonce=[a-z0-9]*">Duplicate</a>
FAQ

Frequently Asked Questions about Post Duplicator Plus