Transliterado Security & Risk Analysis

wordpress.org/plugins/transliterado

This plugin gives better transliteration of non-ASCII characters in slugs.

300 active installs v0.8 PHP + WP 2.5+ Updated Jun 3, 2010
i18ninternationalizationslugs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Transliterado Safe to Use in 2026?

Generally Safe

Score 85/100

Transliterado has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The static analysis of the transliterado plugin v0.8 reveals a generally good security posture with no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. The absence of dangerous functions and external HTTP requests is also a positive sign. However, significant concerns arise from the SQL query handling, where 100% of queries are not using prepared statements, increasing the risk of SQL injection vulnerabilities. Furthermore, the output escaping is severely lacking, with only 13% of outputs properly escaped, leaving the plugin susceptible to cross-site scripting (XSS) attacks. The taint analysis also shows a concerning two flows with unsanitized paths, indicating potential for improper handling of user-supplied data. The plugin's vulnerability history is clean, with no known CVEs, which is a strong indicator of past good security practices. Despite the clean history, the code-level issues identified in the static analysis are critical and require immediate attention to prevent potential security breaches. The lack of nonce and capability checks, while not explicitly penalized by the provided deduction scale for the given entry points, further contributes to a less robust security implementation.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
  • Flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Transliterado Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Transliterado Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
13
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

13% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
transliterado_options_page (transliterado.php:72)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Transliterado Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menutransliterado.php:176
actionsanitize_titletransliterado.php:177
Maintenance & Trust

Transliterado Maintenance & Trust

Maintenance Signals

WordPress version tested2.5
Last updatedJun 3, 2010
PHP min version
Downloads14K

Community Trust

Rating0/100
Number of ratings0
Active installs300
Developer Profile

Transliterado Developer Profile

bertilow

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Transliterado

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
mceStatusbar
FAQ

Frequently Asked Questions about Transliterado