Text Replace Security & Risk Analysis

wordpress.org/plugins/text-replace

Replace text with other text. Handy for creating shortcuts to common, lengthy, or frequently changing text/HTML, or for smilies.

3K active installs v4.0 PHP + WP 4.9+ Updated Jul 12, 2021
coffee2codereplaceshortcutsubstitutiontext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Text Replace Safe to Use in 2026?

Generally Safe

Score 85/100

Text Replace has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "text-replace" v4.0 plugin presents a mixed security posture. On the positive side, there are no reported vulnerabilities (CVEs) and the plugin demonstrates good practices in its SQL query handling, with 100% using prepared statements. Furthermore, the attack surface appears minimal with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. However, a significant concern arises from the presence of the `unserialize()` function, which is a known risk vector for arbitrary code execution if used with untrusted input. The limited output escaping (36%) also suggests a potential for cross-site scripting (XSS) vulnerabilities if user-controlled data is not properly sanitized before being displayed.

The vulnerability history is clean, which is a positive indicator. This suggests the developers may have been diligent in addressing security in previous versions or that the plugin has not been a target for sophisticated attacks. However, the absence of vulnerabilities does not equate to perfect security, especially when inherent risky functions like `unserialize()` are present. The taint analysis showing zero flows is also encouraging, but this might be due to the limited nature of the analysis or the plugin's architecture not exposing data flow to such an extent.

In conclusion, while the plugin boasts a clean CVE history and secure SQL practices, the presence of `unserialize()` and insufficient output escaping are notable weaknesses that require attention. The minimal attack surface is a strength, but it does not negate the risks posed by these specific code signals. Users should be aware of these potential issues and consider whether the benefits of the plugin outweigh the inherent risks.

Key Concerns

  • Use of unserialize() without sanitization
  • Low percentage of properly escaped output
Vulnerabilities
None known

Text Replace Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Text Replace Release Timeline

v4.0Current
v3.9.1
v3.9
v3.8
v3.7
v3.6.1
v3.6
v3.5.1
v3.5
v3.2.2
v3.2.1
v3.2
v3.1.1
v3.1
v3.0.2
v3.0
v2.5
v2.0
v1.0
Code Analysis
Analyzed Mar 16, 2026

Text Replace Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
21
12 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $r['body']['plugins'] );c2c-plugin.php:298

Output Escaping

36% escaped33 total outputs
Attack Surface

Text Replace Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actioninitc2c-plugin.php:122
actionadmin_initc2c-plugin.php:125
actionadmin_headc2c-plugin.php:126
filterplugin_row_metac2c-plugin.php:189
filterhttp_request_argsc2c-plugin.php:192
actionadmin_menuc2c-plugin.php:196
filtercontextual_helpc2c-plugin.php:199
actionadmin_enqueue_scriptsc2c-plugin.php:201
filterget_comment_texttext-replace.php:315
filterget_comment_excerpttext-replace.php:316
actionplugins_loadedtext-replace.php:602
Maintenance & Trust

Text Replace Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedJul 12, 2021
PHP min version
Downloads80K

Community Trust

Rating88/100
Number of ratings18
Active installs3K
Developer Profile

Text Replace Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Text Replace

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/text-replace/
Version Parameters
text-replace/style.css?ver=text-replace/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
Copyright (c) 2004-2021 by Scott Reilly (aka coffee2code)This program is free software; you can redistribute it and/ormodify it under the terms of the GNU General Public Licenseas published by the Free Software Foundation; either version 2+8 more
Data Attributes
data-c2c-text-replace-settings
JS Globals
c2c_TextReplace
FAQ

Frequently Asked Questions about Text Replace