
Related Posts for WPML Security & Risk Analysis
wordpress.org/plugins/related-posts-for-wpmlShows related posts on MultiLanguage sites, working with WPML
Is Related Posts for WPML Safe to Use in 2026?
Generally Safe
Score 85/100Related Posts for WPML has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "related-posts-for-wpml" v1.1 presents a mixed security posture. On the positive side, there are no known CVEs, no common vulnerability types recorded, and the plugin utilizes prepared statements for all SQL queries, which is a strong security practice. The absence of an extensive attack surface, such as AJAX handlers, REST API routes, shortcodes, or cron events without proper authorization checks, also contributes to its current security. However, the static analysis reveals significant concerns regarding code security.
The presence of two "unserialize" calls is a major red flag. If the data being unserialized originates from an untrusted source, this function can lead to remote code execution vulnerabilities. Furthermore, the taint analysis indicates two flows with unsanitized paths, even though they are not categorized as critical or high severity. This suggests potential pathways for malicious input to be processed without adequate sanitization, which could be exploited in conjunction with other weaknesses.
The most concerning aspect is the complete lack of output escaping. With nine total outputs and 0% properly escaped, any data displayed to users that originates from an external source or is processed by the plugin is vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce checks and capability checks on any entry points (though the attack surface is zero) also leaves the door open for potential privilege escalation or unauthorized actions if new entry points were to be introduced or if existing code paths are exploitable in ways not captured by the initial analysis.
In conclusion, while the plugin has a clean vulnerability history and good SQL practices, the presence of "unserialize" calls, unsanitized taint flows, and critically, the complete lack of output escaping, present substantial security risks. The plugin is highly vulnerable to XSS attacks and potentially RCE if the unserialized data is not strictly controlled. The lack of fundamental security checks like nonces and capability checks further exacerbates these risks.
Key Concerns
- Dangerous function: unserialize found
- Flows with unsanitized paths found
- Output escaping: 0% properly escaped
- Nonce checks: 0
- Capability checks: 0
Related Posts for WPML Security Vulnerabilities
Related Posts for WPML Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Related Posts for WPML Attack Surface
WordPress Hooks 1
Maintenance & Trust
Related Posts for WPML Maintenance & Trust
Maintenance Signals
Community Trust
Related Posts for WPML Alternatives
Inline Related Posts
intelly-related-posts
Inline Related Posts AUTOMATICALLY inserts related posts INSIDE your content, capturing immediately the reader's attention.
VK All in One Expansion Unit
vk-all-in-one-expansion-unit
This plug-in is an integrated plug-in with a variety of features that make it powerful your web site.
YARPP – Yet Another Related Posts Plugin
yet-another-related-posts-plugin
The best WordPress plugin for displaying related posts. Simple and flexible, with a powerful proven algorithm and inbuilt caching.
Contextual Related Posts
contextual-related-posts
Keep visitors on your site longer with intelligent, fast-loading, contextually related posts. Block, shortcode, custom post type and widget ready.
Related Posts for WordPress
related-posts-for-wp
The best WordPress plugin for related posts. Simple, flexible, powerful algorithm, and built-in caching. Fully setup with only 1 click!
Related Posts for WPML Developer Profile
2 plugins · 100 total installs
How We Detect Related Posts for WPML
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
titleimg_wrapperclassul_classli_classa_classimg_class