
Remove Links and Scripts Security & Risk Analysis
wordpress.org/plugins/remove-links-and-scriptsRemove unwanted links and scripts from wordpress header.
Is Remove Links and Scripts Safe to Use in 2026?
Generally Safe
Score 85/100Remove Links and Scripts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "remove-links-and-scripts" plugin, version 0.2.4, presents a mixed security profile. On the positive side, it has a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are common vectors for vulnerabilities. The plugin also demonstrates some good practices with capability checks in place for at least one part of its code.
However, significant concerns arise from the static analysis. The presence of the `unserialize` function is a critical red flag, especially given that it's flagged as a dangerous function. The taint analysis reveals two flows with unsanitized paths, indicating a potential for these flows to be exploited if they interact with user-controlled input, even though the severity wasn't classified as critical or high in this analysis. The low percentage of properly escaped output (42%) is also worrying, as it significantly increases the risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce checks on any entry points, combined with the presence of `unserialize`, suggests a vulnerability in how data is handled and processed.
The plugin's vulnerability history is clean, with no known CVEs. This could indicate either that the plugin is genuinely secure or that it hasn't been thoroughly analyzed or targeted for vulnerabilities previously. Given the identified code signals, particularly the use of `unserialize` and the unescaped output, a proactive approach to security is essential. The plugin's strengths lie in its minimal attack surface and good SQL practices, but the identified risks of `unserialize`, unsanitized taint flows, and poor output escaping require immediate attention.
Key Concerns
- Dangerous function unserialize detected
- Flows with unsanitized paths detected
- Low percentage of properly escaped output
- No nonce checks detected
Remove Links and Scripts Security Vulnerabilities
Remove Links and Scripts Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Remove Links and Scripts Attack Surface
WordPress Hooks 6
Maintenance & Trust
Remove Links and Scripts Maintenance & Trust
Maintenance Signals
Community Trust
Remove Links and Scripts Alternatives
Blockinator
blockinator
This plugin will remove script and version numbers from the source of your pages.
Easy Affiliate Links
easy-affiliate-links
Easily manage and cloak all your affiliate links.
Linker – URL shortener & track outbound link clicks
linker
Track Outbound Link Clicks Easily: Shorten & track your site links by using your own domain name. e.g. "your-domain.com/go/link"
Bitly's WordPress Plugin
wp-bitly
Create short links to your content with Bitly’s WordPress Plugin.
Bring Back the Get Shortlink Button
bring-back-the-get-shortlink-button
This plugin brings back the Get Shortlink button, which is hidden by default since WordPress 4.4.
Remove Links and Scripts Developer Profile
7 plugins · 116K total installs
How We Detect Remove Links and Scripts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/remove-links-and-scripts/admin/css/about-plugins.min.cssHTML / DOM Fingerprints
starwrapfloattaglineproductboximgcheckout-button+1 more