Rename XMLRPC Security & Risk Analysis

wordpress.org/plugins/rename-xml-rpc

Make XML-RPC work if you rename the file. Some hosts block access to xmlrpc.php file making it impossible to use

1K active installs v1.1 PHP + WP 2.9+ Updated Apr 26, 2021
xmlrpc
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Rename XMLRPC Safe to Use in 2026?

Generally Safe

Score 85/100

Rename XMLRPC has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'rename-xml-rpc' v1.1 plugin exhibits a generally good security posture based on the static analysis, with no identified dangerous functions, SQL queries using prepared statements, or external HTTP requests. The absence of any recorded vulnerabilities, past or present, further strengthens this impression, suggesting a history of secure development and maintenance. The plugin also appears to have a minimal attack surface, with zero identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks.

However, a significant concern arises from the output escaping analysis, where 100% of outputs are not properly escaped. This is a critical weakness that could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is ever reflected directly in the output without sanitization. While taint analysis showed no problematic flows, this is likely due to the lack of identified entry points for such analysis to occur on. The absence of nonce and capability checks, while potentially acceptable given the zero attack surface, represents a missed opportunity for defense-in-depth if the plugin's functionality were to evolve or if the attack surface were to increase in the future.

In conclusion, the plugin is strong in its avoidance of common vulnerabilities and its lack of historical issues. The primary weakness is the unescaped output, which presents a clear XSS risk. The other points, such as lack of checks, are less concerning given the current minimal attack surface, but highlight areas for potential improvement to ensure future resilience.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

Rename XMLRPC Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Rename XMLRPC Release Timeline

v1.1Current
v1.0
Code Analysis
Analyzed Mar 16, 2026

Rename XMLRPC Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Rename XMLRPC Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headrename-xml-rpc.php:17
filtersite_urlrename-xml-rpc.php:26
Maintenance & Trust

Rename XMLRPC Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedApr 26, 2021
PHP min version
Downloads30K

Community Trust

Rating86/100
Number of ratings12
Active installs1K
Developer Profile

Rename XMLRPC Developer Profile

Jorge Bernal

3 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Rename XMLRPC

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="
FAQ

Frequently Asked Questions about Rename XMLRPC