Random Post Name Security & Risk Analysis

wordpress.org/plugins/random-post-name

Auto-generate a unique random string and set it to post_name. Customization with hooks Use of filter hooks is at your own risk.

10 active installs v1.0 PHP 7.1.24+ WP 5.4+ Updated Jun 12, 2020
postpost_namepressmanramdomslug
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random Post Name Safe to Use in 2026?

Generally Safe

Score 85/100

Random Post Name has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "random-post-name" v1.0 plugin exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The attack surface is non-existent, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, meaning there are no direct entry points for potential attackers. Furthermore, the code analysis reveals a complete absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and importantly, no nonce or capability checks are implemented, which is a double-edged sword. This lack of checks, while contributing to the zero attack surface, also means that if any entry points were to be added in the future, they would be completely unprotected.

The taint analysis shows no flows with unsanitized paths, indicating that user-supplied data, if it were ever processed, is not being mishandled in a way that would lead to injection vulnerabilities. The vulnerability history is also clean, with no recorded CVEs, past or present, which suggests a history of secure development and maintenance. However, the complete absence of nonce and capability checks is a significant concern. While there are currently no entry points to exploit this, any future updates or additions to the plugin that introduce such entry points would immediately become vulnerable due to these missing security mechanisms. This plugin's current state is secure due to its extreme minimalism, but it lacks fundamental security safeguards that are essential for any interactive plugin.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Random Post Name Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Random Post Name Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries
Attack Surface

Random Post Name Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterwp_insert_post_datarandom-post-name.php:32
Maintenance & Trust

Random Post Name Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJun 12, 2020
PHP min version7.1.24
Downloads921

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Random Post Name Developer Profile

PRESSMAN

20 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Random Post Name

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Random Post Name