WP Duplicate posts pages & CPT Security & Risk Analysis

wordpress.org/plugins/wp-duplicate-posts-pages-cpt

Duplicate posts, pages and CPT with all custom data.

100 active installs v1.0 PHP + WP 4.0+ Updated Oct 22, 2016
copycptduplicatepagespost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Duplicate posts pages & CPT Safe to Use in 2026?

Generally Safe

Score 85/100

WP Duplicate posts pages & CPT has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The static analysis of wp-duplicate-posts-pages-cpt v1.0 reveals a strong security posture with no identified critical or high-risk code signals. The absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and unsanitized taint flows is commendable. Furthermore, all identified output points are properly escaped, mitigating cross-site scripting risks. The plugin also demonstrates good practice by utilizing capability checks for its entry points.

However, a significant concern arises from the complete lack of nonce checks, particularly in conjunction with the presence of capability checks. While capability checks ensure that only authenticated users with sufficient privileges can access certain functions, the absence of nonces leaves these endpoints vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker could trick a logged-in administrator into triggering an unintended action by simply crafting a malicious link or form. The vulnerability history, showing no known CVEs, is a positive sign, suggesting a generally well-maintained codebase. Nevertheless, the potential CSRF vulnerability, though not reflected in the CVE history, warrants attention.

In conclusion, wp-duplicate-posts-pages-cpt v1.0 exhibits excellent practices regarding data sanitization and SQL security. Its vulnerability history is clean, which is a strong indicator of diligent development. The primary weakness identified is the lack of CSRF protection due to missing nonce checks on its protected entry points, which presents a moderate risk that should be addressed.

Key Concerns

  • Missing nonce checks on entry points
Vulnerabilities
None known

WP Duplicate posts pages & CPT Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Duplicate posts pages & CPT Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

WP Duplicate posts pages & CPT Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

WP Duplicate posts pages & CPT Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initincludes\dp_manage.php:79
filterpost_row_actionsincludes\dp_manage.php:81
filterpage_row_actionsincludes\dp_manage.php:83
Maintenance & Trust

WP Duplicate posts pages & CPT Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedOct 22, 2016
PHP min version
Downloads5K

Community Trust

Rating60/100
Number of ratings2
Active installs100
Developer Profile

WP Duplicate posts pages & CPT Developer Profile

Priyanka Bhave

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Duplicate posts pages & CPT

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-duplicate-posts-pages-cpt/

HTML / DOM Fingerprints

Data Attributes
duplicate
FAQ

Frequently Asked Questions about WP Duplicate posts pages & CPT