Rewrite Rules Inspector Security & Risk Analysis

wordpress.org/plugins/rewrite-rules-inspector

A simple admin tool for inspecting rewrite rules.

10K active installs v1.6.0 PHP 7.4+ WP 6.4+ Updated Jan 6, 2026
rewrite-rulestools
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Rewrite Rules Inspector Safe to Use in 2026?

Generally Safe

Score 100/100

Rewrite Rules Inspector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The rewrite-rules-inspector plugin v1.6.0 demonstrates a strong security posture based on the provided static analysis and vulnerability history. The absence of any detected dangerous functions, raw SQL queries, file operations, or external HTTP requests is highly positive. Furthermore, the comprehensive use of prepared statements for SQL, high percentage of properly escaped output, and the presence of nonce and capability checks indicate good development practices for input validation and authorization. The complete lack of known CVEs and vulnerability history suggests a well-maintained and secure codebase.

However, it's important to note that the static analysis reveals a zero attack surface. While this is an ideal scenario, it could also imply that the plugin's functionality is limited or that the analysis might not have identified all potential entry points if the plugin integrates deeply with WordPress core in ways not captured by the provided metrics. The taint analysis also showed no unsanitized paths, which is excellent. Given the current data, the plugin appears to be very secure, with no immediate or significant security concerns identified. The strengths significantly outweigh any potential, unconfirmed weaknesses.

Vulnerabilities
None known

Rewrite Rules Inspector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Rewrite Rules Inspector Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
64 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

94% escaped68 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
display_tablenav (src\Admin\RewriteRulesTable.php:166)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Rewrite Rules Inspector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedrewrite-rules-inspector.php:49
actionadmin_menusrc\Admin\AdminPage.php:76
actioninitsrc\Plugin.php:141
actionadmin_enqueue_scriptssrc\Plugin.php:144
actionadmin_initsrc\Plugin.php:172
actionadmin_initsrc\Plugin.php:174
Maintenance & Trust

Rewrite Rules Inspector Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 6, 2026
PHP min version7.4
Downloads455K

Community Trust

Rating100/100
Number of ratings26
Active installs10K
Developer Profile

Rewrite Rules Inspector Developer Profile

Automattic

213 plugins · 19.2M total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1384 days
View full developer profile
Detection Fingerprints

How We Detect Rewrite Rules Inspector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rewrite-rules-inspector/assets/css/admin.css/wp-content/plugins/rewrite-rules-inspector/assets/js/admin.js
Script Paths
/wp-content/plugins/rewrite-rules-inspector/assets/js/admin.js
Version Parameters
rewrite-rules-inspector-admin?ver=rewrite-rules-inspector/assets/css/admin.css?ver=rewrite-rules-inspector/assets/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
rewrite-rules-inspector-headerrewrite-rules-inspector-tablerewrite-rules-inspector-url-tester
Data Attributes
data-original-ruledata-replacement-rule
JS Globals
RewriteRulesInspectorAdminrewriteRulesInspector
FAQ

Frequently Asked Questions about Rewrite Rules Inspector