Revision Removal Security & Risk Analysis

wordpress.org/plugins/revision-removal

Remove the revision posts from your database in order to reduce your database size and optimize the speed of your database load!

10 active installs v2.0 PHP + WP 2.9.2+ Updated Jun 10, 2011
delete-revisiondisable-revisionno-revisionrevision-removal
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Revision Removal Safe to Use in 2026?

Generally Safe

Score 85/100

Revision Removal has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "revision-removal" plugin v2.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices regarding SQL queries, exclusively using prepared statements, and has no known CVEs or historical vulnerabilities. The attack surface is also minimal, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, and no external HTTP requests or file operations are present. However, a significant concern arises from the output escaping analysis, where 100% of the nine identified outputs are not properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the WordPress admin area or potentially user-facing content. Furthermore, the taint analysis reveals two flows with unsanitized paths, which, while not reaching critical or high severity in this analysis, still represent potential vectors for path traversal or information disclosure vulnerabilities if not handled carefully in future updates or related code.

While the absence of known vulnerabilities and the use of prepared statements are strengths, the lack of output escaping and the presence of unsanitized paths are critical weaknesses that expose the site to immediate threats. The plugin appears to be built with a minimal attack surface in mind, but the oversight in output sanitization is a glaring security flaw. It is essential to address the unescaped outputs promptly to mitigate XSS risks. The taint analysis results, though currently not critical, warrant careful review to ensure these unsanitized paths do not become exploited.

Key Concerns

  • All output is unescaped
  • Unsanitized paths in taint analysis
Vulnerabilities
None known

Revision Removal Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Revision Removal Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared5 total queries

Output Escaping

0% escaped9 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
my_options_revision_removal (revision-removal.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Revision Removal Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menurevision-removal.php:34
Maintenance & Trust

Revision Removal Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJun 10, 2011
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Revision Removal Developer Profile

RMvalues

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Revision Removal

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/revision-removal/revision-removal.php

HTML / DOM Fingerprints

CSS Classes
TPouttablew_nd02htTPoutheaderw_nd02htTPtablew_nd02htTPcellw_nd02htTPfooterw_nd02ht
Data Attributes
font size=1verion $dr_ver
JS Globals
del_norevs_no
FAQ

Frequently Asked Questions about Revision Removal