The Permalinker Security & Risk Analysis

wordpress.org/plugins/the-permalinker

Use short codes to dynamically link to your WordPress pages and posts. All you need is the ID. This can come in handy when developing content for Word …

100 active installs v1.9.0 PHP + WP 2.6+ Updated Dec 13, 2024
developmentlinkingmigrationpermalinksstaging
91
A · Safe
CVEs total1
Unpatched0
Last CVEDec 13, 2024
Safety Verdict

Is The Permalinker Safe to Use in 2026?

Generally Safe

Score 91/100

The Permalinker has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Dec 13, 2024Updated 1yr ago
Risk Assessment

The static analysis of 'the-permalinker' v1.9.0 reveals a strong security posture in terms of common web vulnerabilities. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code demonstrates good practices by using prepared statements for all SQL queries and properly escaping all outputs. There are no identified dangerous functions, file operations, external HTTP requests, or bundled libraries that might pose a risk. Taint analysis also found no issues, indicating no obvious vulnerabilities related to unsanitized data flows.

However, the plugin's vulnerability history presents a significant concern. It has one known CVE, though it is currently unpatched. This past vulnerability was a medium severity Cross-site Scripting (XSS) issue, indicating a potential for attackers to inject malicious scripts. While no XSS is detected in the current version through static analysis, the historical presence of such a vulnerability suggests a latent risk. The absence of nonce checks and capability checks across its limited entry points, while seemingly safe due to the lack of entry points, could become a weakness if new entry points are added in future versions without proper security considerations.

In conclusion, 'the-permalinker' v1.9.0 exhibits excellent coding practices in its current state, with no exploitable vulnerabilities found during static analysis. Its limited attack surface further bolsters its security. The primary weakness lies in its past vulnerability history, specifically a medium severity XSS, and the lack of explicit authorization checks, which, while not an immediate threat given the current state, warrants caution for future development.

Key Concerns

  • Unpatched CVE present
  • Medium severity vulnerability in history
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
1

The Permalinker Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-11894medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The Permalinker <= 1.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 13, 2024 Patched in 1.9.0 (3d)
Code Analysis
Analyzed Mar 16, 2026

The Permalinker Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

The Permalinker Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

The Permalinker Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 13, 2024
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

The Permalinker Developer Profile

Andy Stratton

4 plugins · 2K total installs

90
trust score
Avg Security Score
85/100
Avg Patch Time
2 days
View full developer profile
Detection Fingerprints

How We Detect The Permalinker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
permalinker_link
Shortcode Output
[permalink][template_uri]
FAQ

Frequently Asked Questions about The Permalinker