Taxonomy Manager Security & Risk Analysis

wordpress.org/plugins/taxonomy-manager

Add, Edit, Delete & Manage taxonomies for posts, pages, links and custom post types with a few clicks of mouse. Makes adding taxonomies a 100 time …

10 active installs v1.0.1 PHP + WP 2.8+ Updated May 5, 2010
linklinkspagespostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Taxonomy Manager Safe to Use in 2026?

Generally Safe

Score 85/100

Taxonomy Manager has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The taxonomy-manager plugin v1.0.1 exhibits a generally good security posture, with no recorded vulnerabilities or critical security flaws identified in the provided data. The static analysis reveals a clean codebase with a complete absence of dangerous functions, file operations, and external HTTP requests. Notably, all SQL queries are secured using prepared statements, and there are no identified taint flows with unsanitized paths, indicating careful handling of potential injection vectors.

However, the plugin does present some areas for improvement. A significant concern is the extremely low percentage of properly escaped output (18%). This leaves a considerable portion of the plugin's output vulnerable to cross-site scripting (XSS) attacks if user-supplied data is not handled with extreme care within the unescaped portions. Additionally, while nonce checks are present, the complete lack of capability checks in the static analysis suggests that the plugin may not be adequately restricting access to its functionalities to authorized users, potentially allowing lower-privileged users to perform actions they shouldn't.

Given the absence of historical vulnerabilities and the proactive use of prepared statements, the plugin's core data handling appears robust. The strengths lie in the secure database interactions and the lack of exploitable taint flows. The primary weaknesses are the high risk of XSS due to insufficient output escaping and the potential for privilege escalation due to missing capability checks. Overall, the plugin is in a relatively secure state but requires attention to its output sanitization and access control mechanisms to achieve a stronger security posture.

Key Concerns

  • Low output escaping percentage
  • Missing capability checks
Vulnerabilities
None known

Taxonomy Manager Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Taxonomy Manager Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
19 prepared
Unescaped Output
78
17 escaped
Nonce Checks
3
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared19 total queries

Output Escaping

18% escaped95 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
Submit (new_taxonomy.php:4)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Taxonomy Manager Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionwidgets_initregister_widget.php:266
actionadmin_menutaxonomy.php:69
actioninittaxonomy.php:70
actionadmin_menutaxonomy.php:71
actionadd_tag_form_pretaxonomy.php:72
actionadmin_menutaxonomy.php:73
actioninittaxonomy.php:189
Maintenance & Trust

Taxonomy Manager Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedMay 5, 2010
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Taxonomy Manager Developer Profile

Pranav Rastogi

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Taxonomy Manager

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Taxonomy Manager