Rewrite Rule Testing Security & Risk Analysis

wordpress.org/plugins/rewrite-testing

Unit test your rewrite rules from the WordPress Admin.

300 active installs v0.1.1 PHP + WP 3.9+ Updated May 20, 2014
permalinksrewrite-rulestestingtests
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Rewrite Rule Testing Safe to Use in 2026?

Generally Safe

Score 85/100

Rewrite Rule Testing has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'rewrite-testing' plugin v0.1.1 exhibits a strong security posture based on the provided static analysis. The complete absence of any entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces its attack surface. Furthermore, the code signals indicate good security practices, with no dangerous functions, all SQL queries utilizing prepared statements, and a very high percentage of output being properly escaped. The presence of nonce and capability checks, even with a minimal attack surface, is commendable.

Concerns are minimal given the data. The taint analysis shows no identified flows, and the vulnerability history is clean, with no known CVEs. This suggests the plugin is either very new, has a very limited scope of functionality that doesn't lend itself to common vulnerabilities, or has been developed with security in mind. The plugin's strength lies in its minimal functionality and adherence to secure coding principles where applicable.

While the plugin appears very secure, the lack of any identified taint flows or complex code structures might also mean the analysis has not encountered scenarios where vulnerabilities could arise. The absence of file operations and external HTTP requests further limits potential attack vectors. Overall, for its current version and apparent functionality, 'rewrite-testing' demonstrates a robust security foundation.

Vulnerabilities
None known

Rewrite Rule Testing Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Rewrite Rule Testing Release Timeline

v0.1.1Current
Code Analysis
Analyzed Mar 16, 2026

Rewrite Rule Testing Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
21 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

95% escaped22 total outputs
Attack Surface

Rewrite Rule Testing Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menurewrite-testing.php:57
actionadmin_initrewrite-testing.php:59
actionadmin_noticesrewrite-testing.php:61
actionafter_setup_themerewrite-testing.php:480
Maintenance & Trust

Rewrite Rule Testing Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 20, 2014
PHP min version
Downloads30K

Community Trust

Rating100/100
Number of ratings2
Active installs300
Developer Profile

Rewrite Rule Testing Developer Profile

Matthew Boynes

8 plugins · 8K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Rewrite Rule Testing

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rewrite-testing/rewrite-testing.php
Version Parameters
rewrite-testing/rewrite-testing.php?ver=

HTML / DOM Fingerprints

CSS Classes
rt_test_resultserror
Data Attributes
id="rt_test_results"
FAQ

Frequently Asked Questions about Rewrite Rule Testing