Relink Security & Risk Analysis

wordpress.org/plugins/relink

Insert links to other posts in content as shortcode and render it with custom template. Default template located at wp-content/plugins/relink/template …

100 active installs v1.2 PHP 5.4+ WP 4.6+ Updated Oct 28, 2020
incutlinkpost-linkread-moreshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Relink Safe to Use in 2026?

Generally Safe

Score 85/100

Relink has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "relink" plugin v1.2 exhibits a mixed security posture. On the positive side, it demonstrates good practices by not utilizing dangerous functions, all SQL queries are prepared, and there are no recorded vulnerabilities or external HTTP requests. This suggests a developer who is mindful of common security pitfalls. However, significant concerns arise from the static analysis. A notable portion of the attack surface, specifically one AJAX handler, is not protected by authentication checks, presenting a clear entry point for potential attackers. Furthermore, zero percent of output escaping is performed, meaning that any data outputted by the plugin could be vulnerable to cross-site scripting (XSS) attacks if it originates from user input. The absence of nonce checks on the unprotected AJAX handler exacerbates the XSS risk. The plugin's clean vulnerability history is a strength, but it does not mitigate the immediate risks identified in the code analysis. In conclusion, while the plugin has a clean track record and avoids certain dangerous coding practices, the lack of authentication on an AJAX endpoint and the complete absence of output escaping are critical weaknesses that expose users to significant security risks.

Key Concerns

  • Unprotected AJAX handler
  • Output not properly escaped
  • Missing nonce checks on AJAX handler
Vulnerabilities
None known

Relink Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Relink Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

Output Escaping

0% escaped2 total outputs
Attack Surface
1 unprotected

Relink Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_relink_url_to_idrelink.php:89

Shortcodes 1

[relink] relink.php:61
WordPress Hooks 2
filtermce_external_pluginsrelink.php:39
filtermce_buttonsrelink.php:52
Maintenance & Trust

Relink Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 28, 2020
PHP min version5.4
Downloads13K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Relink Developer Profile

nechehin

3 plugins · 170 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Relink

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/relink/assets/js/relink-tinymce.js/wp-content/plugins/relink/assets/js/relink-tinymce.min.js
Script Paths
/wp-content/plugins/relink/assets/js/relink-tinymce.js/wp-content/plugins/relink/assets/js/relink-tinymce.min.js
Version Parameters
relink-tinymce.js?v=relink-tinymce.min.js?v=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Relink