WP URL Extension Security & Risk Analysis

wordpress.org/plugins/wp-url-extension

Adds .html, .php, .whatever to pages, post, custom post type with rewrite rule

10 active installs v0.2 PHP + WP 3.3+ Updated Jun 11, 2019
custom-post-urlextension-in-urlhtmlpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP URL Extension Safe to Use in 2026?

Generally Safe

Score 85/100

WP URL Extension has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The wp-url-extension plugin version 0.2 exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified dangerous functions, file operations, external HTTP requests, and SQL queries not using prepared statements are all excellent indicators of secure coding practices. Furthermore, the limited attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, none of these being unprotected, significantly reduces the plugin's potential exposure to common WordPress attack vectors. The taint analysis showing zero flows, especially with no unsanitized paths or critical/high severity issues, further reinforces this positive assessment. The lack of any recorded vulnerabilities in its history also suggests a well-maintained and secure codebase, or at least one that has not yet been targeted or found to contain exploitable flaws. While the percentage of properly escaped output is high (86%), the small number of total outputs means even a single instance of unescaped output could be a concern, though it's not explicitly detailed here as a critical issue.

Key Concerns

  • 86% output escaping is good but not perfect
  • Lack of capability checks
  • Lack of nonce checks
Vulnerabilities
None known

WP URL Extension Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP URL Extension Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

WP URL Extension Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
filterrewrite_rules_arrayclass-url-extension.php:40
filterpost_linkclass-url-extension.php:42
filterpost_type_linkclass-url-extension.php:43
filtertag_linkclass-url-extension.php:44
filtercategory_rewrite_rulesclass-url-extension.php:46
filtercategory_linkclass-url-extension.php:47
filterpage_rewrite_rulesclass-url-extension.php:51
filterpage_linkclass-url-extension.php:52
filterredirect_canonicalclass-url-extension.php:55
filteruser_trailingslashitclass-url-extension.php:56
filterregister_post_type_argsclass-url-extension.php:57
actionadmin_initwp-url-extension-settings.php:15
actionadmin_initwp-url-extension-settings.php:16
filterplugin_action_linkswp-url-extension.php:22
Maintenance & Trust

WP URL Extension Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedJun 11, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP URL Extension Developer Profile

EviLex

2 plugins · 310 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP URL Extension

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP URL Extension