Simple Copy Post Button Security & Risk Analysis

wordpress.org/plugins/simple-copy-post

Copies/Duplicates Posts, Pages, and Custom Post Types with just one click.

400 active installs v1.0 PHP + WP 3.0+ Updated Aug 27, 2013
copyduplicatepagepostpost-type
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Copy Post Button Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Copy Post Button has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'simple-copy-post' plugin version 1.0 presents a generally good security posture with no recorded vulnerabilities or critical taint flows. The use of prepared statements for all SQL queries and the presence of nonce and capability checks on its single AJAX entry point are positive indicators. The absence of file operations, external HTTP requests, and shortcodes further limits its attack surface.

However, a significant concern arises from the complete lack of output escaping. With three identified output points and none properly escaped, this represents a direct risk of Cross-Site Scripting (XSS) vulnerabilities. An attacker could potentially inject malicious scripts through this plugin's functionality, impacting users who interact with the output. While the current data shows no past vulnerabilities, this oversight in output sanitization is a notable weakness that warrants attention.

In conclusion, while the plugin benefits from strong input validation and secure SQL practices, the unescaped output is a critical flaw that significantly elevates its risk profile. Addressing this immediately is paramount to mitigating XSS threats. The lack of historical vulnerabilities is positive, but it should not overshadow the active risks identified in the static analysis.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

Simple Copy Post Button Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Copy Post Button Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
scpjr3_action (simple-copy-post.php:114)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple Copy Post Button Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_scpjr3_scriptsimple-copy-post.php:112
WordPress Hooks 4
actioninitsimple-copy-post.php:39
actionadmin_enqueue_scriptssimple-copy-post.php:51
filterpost_row_actionssimple-copy-post.php:67
actionpost_submitbox_misc_actionssimple-copy-post.php:85
Maintenance & Trust

Simple Copy Post Button Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedAug 27, 2013
PHP min version
Downloads12K

Community Trust

Rating90/100
Number of ratings8
Active installs400
Developer Profile

Simple Copy Post Button Developer Profile

John Regan

2 plugins · 100K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Copy Post Button

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-copy-post/simple-copy-post.js
Script Paths
/wp-content/plugins/simple-copy-post/simple-copy-post.js

HTML / DOM Fingerprints

CSS Classes
scpjr3-messagescpjr3-copy-post
Data Attributes
id="scpjr3-message"id="scpjr3-copy-post"data-noncedata-post-id
JS Globals
scpjr3Ajax
Shortcode Output
Copy this
FAQ

Frequently Asked Questions about Simple Copy Post Button