
Say What? Security & Risk Analysis
wordpress.org/plugins/say-whatAn easy-to-use plugin that allows you to change translatable strings from plugins / themes and WordPress core without editing code.
Is Say What? Safe to Use in 2026?
Generally Safe
Score 100/100Say What? has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'say-what' plugin version 2.2.6 demonstrates a generally strong security posture, adhering to several key WordPress security best practices. The absence of known CVEs and the consistent use of prepared statements for all SQL queries are significant strengths. Furthermore, the plugin correctly implements nonce checks and capability checks, and its output escaping is also largely effective, with a high percentage of outputs being properly escaped. This suggests a conscientious development approach focused on mitigating common web vulnerabilities.
However, the static analysis reveals some areas for concern. Specifically, the taint analysis highlights three flows with unsanitized paths, all categorized as high severity. While there are no publicly known vulnerabilities, these internal findings suggest potential avenues for exploitation if not properly addressed. The presence of unsanitized paths could lead to issues like path traversal or information disclosure if user-supplied input is not rigorously validated and sanitized before being used in file operations or other sensitive functions. The fact that these are not flagged as critical is a positive, but their existence warrants investigation.
In conclusion, 'say-what' v2.2.6 is a plugin that has implemented many security best practices effectively, as evidenced by its clean vulnerability history and secure SQL handling. The primary concern lies in the three high-severity taint flows with unsanitized paths. Addressing these specific code paths will be crucial to further hardening the plugin's security. While the overall risk appears moderate, proactive remediation of these identified flows is recommended to prevent potential future vulnerabilities.
Key Concerns
- High severity taint flow with unsanitized path
- High severity taint flow with unsanitized path
- High severity taint flow with unsanitized path
Say What? Security Vulnerabilities
Say What? Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Say What? Attack Surface
WordPress Hooks 11
Maintenance & Trust
Say What? Maintenance & Trust
Maintenance Signals
Community Trust
Say What? Alternatives
WP Override String Translations
wp-override-translations
Thanks to this plugin you can translate all the strings of your portal through the admin panel.
String Replacer
string-replacer
Replace any string visible to site visitors or found in outgoing emails—titles, content, footers, and more. Comes with a dynamic admin interface.
WPML String Translation Importer
string-translation-importer-wpml
WPML String Translation Importer is used to import wpml string translations to update their translations.
Just Translate
just-translate
Automatically captures and translates text strings using a custom translation panel with multi-language support.
Loco Translate
loco-translate
Translate WordPress plugins and themes directly in your browser. Versatile PO file editor with integrated AI translation providers.
Say What? Developer Profile
4 plugins · 41K total installs
How We Detect Say What?
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/say-what/css/admin.csssay-what/css/admin.css?ver=