Slug or PostID Security & Risk Analysis

wordpress.org/plugins/slug-or-postid

This plugin uses Slug or PostID for PostName. It is done automatically.

600 active installs v1.0 PHP + WP 3.1+ Updated Feb 6, 2013
pluginpostslug
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Slug or PostID Safe to Use in 2026?

Generally Safe

Score 85/100

Slug or PostID has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "slug-or-postid" v1.0 plugin exhibits an exceptionally strong security posture based on the provided static analysis. There are no identified attack vectors through AJAX, REST API, shortcodes, or cron events. Furthermore, the code demonstrates excellent security practices by not utilizing dangerous functions, all SQL queries are prepared, and all outputs are properly escaped. The absence of file operations, external HTTP requests, and particularly the lack of nonce and capability checks on any entry points (as there are none) further solidify this. The taint analysis also reveals no concerning data flows.

The vulnerability history is equally pristine, with zero known CVEs and no recorded vulnerabilities of any kind. This indicates a well-developed and likely rigorously tested plugin, or a plugin that has not yet attracted malicious attention due to its perceived simplicity or lack of complex functionality. The complete absence of any identified weaknesses in the static analysis and vulnerability history suggests a high level of confidence in its security.

In conclusion, "slug-or-postid" v1.0 appears to be a highly secure plugin. Its strengths lie in its minimal attack surface and the absence of any flagged vulnerabilities or risky code patterns. The only potential area for slight concern, though not a direct finding in this analysis, is the complete lack of any capability or nonce checks, which is a direct consequence of having no entry points to check. This is not a vulnerability in itself but reflects the plugin's design. Overall, this plugin presents a very low security risk.

Vulnerabilities
None known

Slug or PostID Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Slug or PostID Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Slug or PostID Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtername_save_preslug-or-postid.php:53
filterwp_insert_post_dataslug-or-postid.php:54
Maintenance & Trust

Slug or PostID Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedFeb 6, 2013
PHP min version
Downloads4K

Community Trust

Rating60/100
Number of ratings1
Active installs600
Developer Profile

Slug or PostID Developer Profile

unimakura

1 plugin · 600 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Slug or PostID

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Slug or PostID