WP Change Custom Posts Slugs Security & Risk Analysis

wordpress.org/plugins/wp-change-custom-post-slug

The plugin allows to can easily change slug of custom post types from WordPress admin panel.

700 active installs v1.2 PHP + WP + Updated Oct 16, 2020
custom-post-typescustom-slugswp-change-custom-posts-slugs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Change Custom Posts Slugs Safe to Use in 2026?

Generally Safe

Score 85/100

WP Change Custom Posts Slugs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "wp-change-custom-post-slug" v1.2 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of identified dangerous functions, SQL queries without prepared statements, and external HTTP requests are positive indicators. Furthermore, the analysis reports zero taint flows with unsanitized paths, suggesting that data input and processing are handled with care, minimizing the risk of injection vulnerabilities. The lack of known CVEs and historical vulnerabilities further reinforces its current security standing.

However, there are areas that warrant attention despite the generally good security. The complete absence of nonce checks and capability checks across all entry points is a significant concern. While the static analysis reports zero unprotected entry points, this is likely due to the total number of entry points being zero. If the plugin were to introduce any AJAX handlers, REST API routes, shortcodes, or cron events in the future, the lack of these fundamental WordPress security mechanisms would expose it to serious risks like Cross-Site Request Forgery (CSRF) and unauthorized access.

In conclusion, while "wp-change-custom-post-slug" v1.2 currently appears secure due to its limited attack surface and the absence of known vulnerabilities, the lack of implemented authentication and authorization checks is a critical weakness. This oversight creates a latent risk that could be exploited if new entry points are added or if the plugin's functionality were to expand. Addressing these fundamental security controls should be a priority to ensure robust security moving forward.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Change Custom Posts Slugs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Change Custom Posts Slugs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

88% escaped8 total outputs
Attack Surface

WP Change Custom Posts Slugs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuwp-change-custom-post-slugs.php:11
actionadmin_initwp-change-custom-post-slugs.php:16
filterupdate_option_th-wp-change-custom-post-slugs-settingswp-change-custom-post-slugs.php:25
actioninitwp-change-custom-post-slugs.php:145
Maintenance & Trust

WP Change Custom Posts Slugs Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 16, 2020
PHP min version
Downloads9K

Community Trust

Rating92/100
Number of ratings11
Active installs700
Developer Profile

WP Change Custom Posts Slugs Developer Profile

ThemeHeap

1 plugin · 700 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Change Custom Posts Slugs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
regular-textcode
Data Attributes
name="th-wp-change-custom-post-slugs-settingsid="
FAQ

Frequently Asked Questions about WP Change Custom Posts Slugs