Reveal IDs Security & Risk Analysis

wordpress.org/plugins/reveal-ids-for-wp-admin-25

What this plugin does is to reveal most removed IDs on admin pages, as it was in versions prior to 2.5.

40K active installs v1.6.2 PHP + WP 3.0+ Updated Feb 15, 2026
idmediapagepostwp-admin
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Reveal IDs Safe to Use in 2026?

Generally Safe

Score 100/100

Reveal IDs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'reveal-ids-for-wp-admin-25' v1.6.2 plugin exhibits a generally good security posture with no direct evidence of critical vulnerabilities. The absence of any recorded CVEs, common vulnerability types, or recent vulnerabilities is a positive indicator, suggesting a history of responsible development or a lack of significant past security issues. The code analysis shows a clean slate regarding dangerous functions, SQL injection risks (all queries use prepared statements), file operations, and external HTTP requests. Furthermore, the attack surface is zero in terms of AJAX, REST API, shortcodes, and cron events, implying no direct code execution entry points that are exposed.

However, a significant concern arises from the output escaping findings. 100% of the observed output instances (3 total) are not properly escaped. This is a critical weakness as it opens the door to Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the plugin that originates from user input or external sources, without proper sanitization before output, could be exploited by attackers to inject malicious scripts into the user's browser, leading to session hijacking, defacement, or other harmful actions. The complete lack of nonce checks and capability checks, while seemingly mitigated by the zero attack surface, means that if any entry points were to be discovered or added in the future, they would be entirely unprotected against unauthorized access or manipulation.

In conclusion, while the plugin demonstrates strengths in avoiding common pitfalls like raw SQL and a large attack surface, the failure to properly escape output is a major security flaw that requires immediate attention. The vulnerability history is reassuring, but the current code presents a clear XSS risk that should be addressed.

Key Concerns

  • Unescaped output found in 100% of instances
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Reveal IDs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Reveal IDs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Reveal IDs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 23
actionin_admin_footerauthorplugins.inc.php:48
actionadmin_print_scriptsauthorplugins.inc.php:53
actionadmin_initauthorplugins.inc.php:55
actionadmin_noticesreveal-ids-for-wp-admin-25.php:80
actionplugins_loadedreveal-ids-for-wp-admin-25.php:84
actionadmin_initreveal-ids-for-wp-admin-25.php:85
actionadmin_headreveal-ids-for-wp-admin-25.php:87
filtermanage_media_columnsreveal-ids-for-wp-admin-25.php:121
actionmanage_media_custom_columnreveal-ids-for-wp-admin-25.php:122
filtermanage_link-manager_columnsreveal-ids-for-wp-admin-25.php:124
actionmanage_link_custom_columnreveal-ids-for-wp-admin-25.php:125
actionmanage_edit-link-categories_columnsreveal-ids-for-wp-admin-25.php:127
filtermanage_link_categories_custom_columnreveal-ids-for-wp-admin-25.php:128
actionmanage_users_columnsreveal-ids-for-wp-admin-25.php:148
filtermanage_users_custom_columnreveal-ids-for-wp-admin-25.php:149
actionmanage_users-network_columnsreveal-ids-for-wp-admin-25.php:151
filtermanage_users_sortable_columnsreveal-ids-for-wp-admin-25.php:152
filtermanage_users-network_sortable_columnsreveal-ids-for-wp-admin-25.php:153
actionmanage_edit-comments_columnsreveal-ids-for-wp-admin-25.php:156
actionmanage_comments_custom_columnreveal-ids-for-wp-admin-25.php:157
filtermanage_edit-comments_sortable_columnsreveal-ids-for-wp-admin-25.php:159
actionmanage_sites-network_columnsreveal-ids-for-wp-admin-25.php:162
filtermanage_sites_custom_columnreveal-ids-for-wp-admin-25.php:163
Maintenance & Trust

Reveal IDs Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.99
Last updatedFeb 15, 2026
PHP min version
Downloads1.1M

Community Trust

Rating100/100
Number of ratings61
Active installs40K
Developer Profile

Reveal IDs Developer Profile

wpseek

7 plugins · 79K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
728 days
View full developer profile
Detection Fingerprints

How We Detect Reveal IDs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
column-ridwpaid
FAQ

Frequently Asked Questions about Reveal IDs