R2K Terms Copier Security & Risk Analysis

wordpress.org/plugins/r2k-terms-copier

Duplicate taxonomy terms including all meta data and relationships with a single click.

20 active installs v1.0.1 PHP 7.4+ WP 5.0+ Updated Feb 1, 2026
clonecopyduplicatetaxonomyterms
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is R2K Terms Copier Safe to Use in 2026?

Generally Safe

Score 100/100

R2K Terms Copier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'r2k-terms-copier' plugin v1.0.1 exhibits an excellent security posture based on the provided static analysis. The absence of any detected dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), unsanitized taint flows, and proper output escaping for all outputs are significant strengths. Furthermore, the presence of a nonce check and a capability check demonstrates an understanding of WordPress security best practices for protecting its (albeit minimal) attack surface. The lack of file operations and external HTTP requests also reduces potential attack vectors.

The plugin's vulnerability history is also a strong positive, with zero recorded CVEs. This, combined with the clean static analysis, suggests a well-developed and secure plugin. However, it's important to note that the attack surface is entirely zero, meaning there are no AJAX handlers, REST API routes, shortcodes, or cron events. While this contributes to its current security, it also means the plugin may not have any significant functionality, or its functionality is implemented in a way that doesn't expose traditional entry points.

In conclusion, based on this data, the plugin appears to be highly secure. The developers have adhered to fundamental WordPress security principles. The primary limitation of this assessment is the extremely small, or non-existent, attack surface, which might mean limited functionality. Without further information on the plugin's purpose and implementation details beyond the scope of static analysis, it is difficult to identify any specific weaknesses. It is recommended to continue monitoring for future vulnerabilities, as with any software.

Vulnerabilities
None known

R2K Terms Copier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

R2K Terms Copier Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
10 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped10 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
show_admin_notices (r2k-terms-copier.php:260)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

R2K Terms Copier Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initr2k-terms-copier.php:28
filtertag_row_actionsr2k-terms-copier.php:29
filterterm_row_actionsr2k-terms-copier.php:30
actionadmin_noticesr2k-terms-copier.php:31
Maintenance & Trust

R2K Terms Copier Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 1, 2026
PHP min version7.4
Downloads192

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

R2K Terms Copier Developer Profile

systemsrtk

3 plugins · 150 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect R2K Terms Copier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
data-term_iddata-taxonomy
FAQ

Frequently Asked Questions about R2K Terms Copier