searchReplace Security & Risk Analysis

wordpress.org/plugins/searchreplace

SearchReplace checks for and replaces content in your posts, pages and/or comments. Fully configurable.

20 active installs v1.2.2 PHP + WP 2.9.1+ Updated Dec 31, 2024
commentspostsregular-expressionreplacesearch
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is searchReplace Safe to Use in 2026?

Generally Safe

Score 92/100

searchReplace has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The searchreplace plugin v1.2.2 exhibits a mixed security posture. On one hand, it shows strong adherence to secure coding practices by exclusively using prepared statements for SQL queries and demonstrating no known historical vulnerabilities (CVEs). The absence of a significant attack surface, including no AJAX handlers, REST API routes, shortcodes, or cron events, is also a positive indicator, reducing the potential for direct exploitation.

However, the static analysis reveals critical weaknesses. The presence of the `unserialize` function, especially without any apparent capability or nonce checks, is a significant concern. This function is notoriously dangerous as it can lead to Remote Code Execution (RCE) if an attacker can control the data being unserialized. Furthermore, the taint analysis indicates two flows with unsanitized paths, although they are not classified as critical or high severity. The most alarming finding is that 100% of the output is not properly escaped, presenting a clear Cross-Site Scripting (XSS) risk.

In conclusion, while the plugin benefits from a small attack surface and a clean vulnerability history, the identified risks associated with `unserialize`, unsanitized taint flows, and particularly unescaped output represent substantial security concerns that require immediate attention. The lack of observed protection mechanisms like nonce and capability checks around dangerous functions amplifies these risks.

Key Concerns

  • Dangerous function 'unserialize' used without apparent checks
  • 2 flows with unsanitized paths identified
  • 100% of output not properly escaped
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

searchReplace Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

searchReplace Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$searchReplace_options = unserialize($searchReplaceInit);searchReplace.php:184

Output Escaping

0% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
searchReplace_option_page (searchReplace.php:43)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

searchReplace Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menusearchReplace.php:208
actionthe_contentsearchReplace.php:209
actioncomment_textsearchReplace.php:210
Maintenance & Trust

searchReplace Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 31, 2024
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

searchReplace Developer Profile

Joost

2 plugins · 30 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect searchReplace

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about searchReplace