
Reveal IDs Security & Risk Analysis
wordpress.org/plugins/reveal-ids-for-wp-admin-25What this plugin does is to reveal most removed IDs on admin pages, as it was in versions prior to 2.5.
Is Reveal IDs Safe to Use in 2026?
Generally Safe
Score 100/100Reveal IDs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
Based on the provided static analysis and vulnerability history, the 'reveal-ids-for-wp-admin-25' v1.6.2 plugin exhibits a generally good security posture with no direct evidence of critical vulnerabilities. The absence of any recorded CVEs, common vulnerability types, or recent vulnerabilities is a positive indicator, suggesting a history of responsible development or a lack of significant past security issues. The code analysis shows a clean slate regarding dangerous functions, SQL injection risks (all queries use prepared statements), file operations, and external HTTP requests. Furthermore, the attack surface is zero in terms of AJAX, REST API, shortcodes, and cron events, implying no direct code execution entry points that are exposed.
However, a significant concern arises from the output escaping findings. 100% of the observed output instances (3 total) are not properly escaped. This is a critical weakness as it opens the door to Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the plugin that originates from user input or external sources, without proper sanitization before output, could be exploited by attackers to inject malicious scripts into the user's browser, leading to session hijacking, defacement, or other harmful actions. The complete lack of nonce checks and capability checks, while seemingly mitigated by the zero attack surface, means that if any entry points were to be discovered or added in the future, they would be entirely unprotected against unauthorized access or manipulation.
In conclusion, while the plugin demonstrates strengths in avoiding common pitfalls like raw SQL and a large attack surface, the failure to properly escape output is a major security flaw that requires immediate attention. The vulnerability history is reassuring, but the current code presents a clear XSS risk that should be addressed.
Key Concerns
- Unescaped output found in 100% of instances
- No capability checks found
- No nonce checks found
Reveal IDs Security Vulnerabilities
Reveal IDs Code Analysis
Output Escaping
Reveal IDs Attack Surface
WordPress Hooks 23
Maintenance & Trust
Reveal IDs Maintenance & Trust
Maintenance Signals
Community Trust
Reveal IDs Alternatives
Elementor Custom Skin
ele-custom-skin
Create new skins for Elementor PRO 3.x page builder. Design your own skins for Post and Post Archive Widgets using Elementor Loop Templates.
Title Remover
title-remover
Gives you the ability to hide the title of any post, page or custom post type item without affecting menus or titles in the admin area.
Hide Page And Post Title
hide-page-and-post-title
Hide title on single pages and posts.
Apollo13 Framework Extensions
apollo13-framework-extensions
Adds custom post types, shortcodes and some features that are used in themes built on Apollo13 Framework.
WebberZone Top 10 — Popular Posts
top-10
Track post views and page views, and display popular posts and trending content on your WordPress site.
Reveal IDs Developer Profile
7 plugins · 79K total installs
How We Detect Reveal IDs
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
column-ridwpaid