WP Replicate Post Security & Risk Analysis

wordpress.org/plugins/wp-replicate-post

Replicate any Post, Pages, etc in single click!

100 active installs v4.2 PHP + WP 3.0+ Updated Oct 24, 2025
clonecopyduplicatepagepost
99
A · Safe
CVEs total1
Unpatched0
Last CVEMay 10, 2023
Safety Verdict

Is WP Replicate Post Safe to Use in 2026?

Generally Safe

Score 99/100

WP Replicate Post has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: May 10, 2023Updated 5mo ago
Risk Assessment

The wp-replicate-post plugin v4.2 exhibits a generally positive security posture due to its minimal attack surface and consistent use of prepared statements for SQL queries. The static analysis reveals no critical or high severity taint flows, and the absence of AJAX handlers, REST API routes, and shortcodes without authentication checks is a significant strength. However, the fact that only 50% of output is properly escaped raises a concern for potential cross-site scripting (XSS) vulnerabilities, especially if sensitive data is being outputted. The plugin's history shows one high-severity SQL injection vulnerability, which, while currently patched, indicates a past weakness in handling user input for database operations. The presence of a nonce check is a good practice, but the complete lack of capability checks across its entry points is a notable omission, potentially allowing unauthorized users to interact with the plugin's functions if they can find a way to trigger them.

Key Concerns

  • Half of output is not properly escaped
  • No capability checks on entry points
  • Past high severity SQL injection vulnerability
Vulnerabilities
1

WP Replicate Post Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2023-2237high · 8.8Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

WP Replicate Post <= 4.0.2 - Authenticated (Contributor+) SQL Injection

May 10, 2023 Patched in 4.1 (258d)
Code Analysis
Analyzed Mar 16, 2026

WP Replicate Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
3
3 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

50% escaped6 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
replicate_item_save (init\functions.php:147)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Replicate Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_footer-edit.phpinit\functions.php:15
actioninitinit\functions.php:35
actionadmin_initinit\functions.php:112
filterpost_row_actionsinit\functions.php:120
filterpage_row_actionsinit\functions.php:121
actionadmin_action_replicate_item_saveinit\functions.php:142
filterplugin_action_linksinit\functions.php:214
actionadmin_initinit\replicate_item_option.php:6
actionadmin_menuinit\replicate_item_option.php:24
Maintenance & Trust

WP Replicate Post Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 24, 2025
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

WP Replicate Post Developer Profile

Yudiz Solutions Pvt. Ltd.

14 plugins · 6K total installs

85
trust score
Avg Security Score
96/100
Avg Patch Time
59 days
View full developer profile
Detection Fingerprints

How We Detect WP Replicate Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
replicate_item_enable
FAQ

Frequently Asked Questions about WP Replicate Post