Transler Security & Risk Analysis

wordpress.org/plugins/transler

Осуществляет транслитерацию кириллицы в название файлов и слагах записей.

10 active installs v1.0.6 PHP + WP 4.6+ Updated Apr 24, 2017
cyrilliclatinrustolatslugstransliteration
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Transler Safe to Use in 2026?

Generally Safe

Score 85/100

Transler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the "transler" v1.0.6 plugin exhibits a strong security posture. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with exposed entry points significantly limits the plugin's attack surface. Furthermore, the code analysis reveals a commendable adherence to secure coding practices, with no dangerous functions, file operations, or external HTTP requests. All SQL queries are prepared, and all outputs are properly escaped, indicating a robust defense against common injection and cross-site scripting vulnerabilities.

The plugin also benefits from a clean vulnerability history, with no recorded CVEs of any severity. This lack of past issues, combined with the current static analysis findings, suggests that the developers have either a strong commitment to security or the plugin's functionality is limited enough to avoid common security pitfalls. The absence of taint analysis findings further reinforces the perception of a secure codebase.

While the current analysis presents a very positive security outlook, the most significant area of concern, albeit not explicitly a vulnerability in this version, is the complete lack of nonces and capability checks. Although the attack surface is currently zero, this indicates a potential vulnerability if new entry points are added in future versions without implementing these fundamental security measures. Therefore, while the current state is excellent, future development must prioritize the implementation of these checks to maintain this high level of security.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Transler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Transler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Transler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionshutdowntransler.php:16
filtersanitize_titletransler.php:75
filtersanitize_file_nametransler.php:77
Maintenance & Trust

Transler Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 24, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Transler Developer Profile

3lion

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Transler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/transler/transler.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Transler