WP Version in Query String Modifier Security & Risk Analysis

wordpress.org/plugins/wp-version-in-query-string-modifier

Removes or modifies the version (query string 'ver' parameter) in media resources' url.

100 active installs v1.0.0.7 PHP + WP 3.9.3+ Updated Jul 31, 2016
optimizationquery-stringremove-query-stringremove-versionversion
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Version in Query String Modifier Safe to Use in 2026?

Generally Safe

Score 85/100

WP Version in Query String Modifier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "wp-version-in-query-string-modifier" plugin exhibits a generally positive security posture in terms of its attack surface and vulnerability history. The static analysis reveals no direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication or proper checks, which is a significant strength. Furthermore, the absence of any recorded vulnerabilities (CVEs) or critical taint flows suggests a well-developed and secure codebase thus far.

However, there are notable concerns regarding the handling of data within the plugin. The static analysis highlights that 100% of SQL queries are not using prepared statements, which represents a significant risk of SQL injection vulnerabilities. Additionally, a concerning 0% of output is properly escaped, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. While the plugin demonstrates good practices by having capability checks and no external HTTP requests, these output and database vulnerabilities significantly detract from its overall security.

In conclusion, while the plugin's limited attack surface and clean vulnerability history are commendable, the identified issues with SQL query preparation and output escaping present substantial security risks that require immediate attention. Addressing these specific coding flaws is crucial to mitigating the potential for exploitation.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
Vulnerabilities
None known

WP Version in Query String Modifier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Version in Query String Modifier Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
11
0 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped11 total outputs
Attack Surface

WP Version in Query String Modifier Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuwp-version-in-query-string-modifier.php:220
filterscript_loader_srcwp-version-in-query-string-modifier.php:226
filterstyle_loader_srcwp-version-in-query-string-modifier.php:227
Maintenance & Trust

WP Version in Query String Modifier Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 31, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings4
Active installs100
Developer Profile

WP Version in Query String Modifier Developer Profile

joesat

3 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Version in Query String Modifier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
/wp-content/plugins/wp-version-in-query-string-modifier/style.css?ver=/wp-content/plugins/wp-version-in-query-string-modifier/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Version in Query String Modifier