Taxonomy Toolbox Security & Risk Analysis

wordpress.org/plugins/taxonomy-toolbox

Taxonomy Toolbox allows you to quickly review and update your Categories, Tags and other taxonomies.

60 active installs v0.1.2 PHP + WP 3+ Updated Oct 20, 2015
admincategorydevelopertaxonomiestaxonomy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Taxonomy Toolbox Safe to Use in 2026?

Generally Safe

Score 85/100

Taxonomy Toolbox has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The taxonomy-toolbox plugin v0.1.2 exhibits a generally positive security posture based on the static analysis. A key strength is the complete absence of dangerous functions, file operations, and external HTTP requests, which significantly reduces the plugin's attack surface. Furthermore, all SQL queries are properly prepared, mitigating the risk of SQL injection vulnerabilities. The presence of a nonce check, while only one, is also a positive sign of security awareness.

However, the analysis reveals a significant concern regarding output escaping. With only 11% of outputs properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. This means that data rendered by the plugin could be injected with malicious scripts, potentially impacting users. The lack of capability checks is also noteworthy, as it implies that the plugin's functionalities might be accessible to users without the necessary permissions, although the limited attack surface currently mitigates this risk. The plugin's vulnerability history is clean, with no recorded CVEs, which is excellent, but this should not breed complacency, especially given the identified output escaping issues.

In conclusion, while the absence of many common vulnerability vectors is commendable, the severely low rate of output escaping presents a critical security weakness. The plugin developers should prioritize addressing the XSS risk by ensuring all output is properly escaped. The lack of capability checks should also be reviewed in conjunction with the plugin's intended functionality and user roles.

Key Concerns

  • Poor output escaping (XSS risk)
  • Lack of capability checks
Vulnerabilities
None known

Taxonomy Toolbox Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Taxonomy Toolbox Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
10 prepared
Unescaped Output
8
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared10 total queries

Output Escaping

11% escaped9 total outputs
Attack Surface

Taxonomy Toolbox Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_inittaxonomy-toolbox-admin.php:6
actionadmin_menutaxonomy-toolbox-admin.php:15
actionadmin_footer-edit-tags.phptaxonomy-toolbox-admin.php:377
actionload-edit-tags.phptaxonomy-toolbox-admin.php:400
actionadmin_noticestaxonomy-toolbox-admin.php:519
Maintenance & Trust

Taxonomy Toolbox Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 20, 2015
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings2
Active installs60
Developer Profile

Taxonomy Toolbox Developer Profile

pantsonhead

5 plugins · 230 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Taxonomy Toolbox

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/taxonomy-toolbox/css/taxonomy-toolbox.css
Version Parameters
taxonomy-toolbox/css/taxonomy-toolbox.css?ver=

HTML / DOM Fingerprints

CSS Classes
taxonomy-toolbox-wrap
FAQ

Frequently Asked Questions about Taxonomy Toolbox