
WPML Edits Security & Risk Analysis
wordpress.org/plugins/wpml-editsEdit language code and name in WPML
Is WPML Edits Safe to Use in 2026?
Generally Safe
Score 85/100WPML Edits has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wpml-edits" plugin v1.0 exhibits a mixed security posture. On the positive side, the static analysis reveals no discovered dangerous functions, no file operations, no external HTTP requests, and all SQL queries are performed using prepared statements, which are strong indicators of good security practices for database interactions. Furthermore, the absence of any recorded vulnerabilities in its history, including CVEs of any severity, suggests a generally stable and well-maintained codebase. However, there are significant areas of concern. The plugin lacks any nonce checks and capability checks, meaning that actions performed by the plugin, if they existed at any entry points, could potentially be exploited by unauthorized users or even through cross-site request forgery if entry points were present. Crucially, 100% of the output escaping is missing, posing a high risk of cross-site scripting (XSS) vulnerabilities if any dynamic data is rendered to the user. The taint analysis also yielded no flows, which is positive but doesn't negate the other identified risks. The limited attack surface (0 entry points) currently mitigates some of these risks, but any future addition of features without addressing the output escaping and authorization checks would significantly increase the plugin's vulnerability.
In conclusion, while the "wpml-edits" plugin v1.0 shows promise with its secure handling of SQL and lack of historical vulnerabilities, the complete absence of output escaping is a critical flaw that leaves it highly susceptible to XSS attacks. The lack of nonce and capability checks also presents a significant security gap. The current low attack surface offers a temporary buffer, but a thorough review and remediation of these identified weaknesses are essential before the plugin can be considered secure for production environments. The strengths lie in its database interactions and historical stability, but the weaknesses in output sanitization and authorization are severe.
Key Concerns
- All output escaping is missing
- No nonce checks found
- No capability checks found
WPML Edits Security Vulnerabilities
WPML Edits Release Timeline
WPML Edits Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
WPML Edits Attack Surface
WordPress Hooks 2
Maintenance & Trust
WPML Edits Maintenance & Trust
Maintenance Signals
Community Trust
WPML Edits Alternatives
WP Editor Widget
wp-editor-widget
WP Editor Widget adds a rich text widget where the content is edited using the standard WordPress visual editor.
WPML Widgets
wpml-widgets
WPML Widgets is a simple to use extension to add a language selector dropdown to your widgets.
WPML Multilingual for BuddyPress and BuddyBoss
buddypress-multilingual
WPML Multilingual for BuddyPress and BuddyBoss allows BuddyPress and BuddyBoss sites to run fully multilingual using the WPML plugin.
Simple Yearly Archive
simple-yearly-archive
Simple Yearly Archive is a rather neat and simple Wordpress plugin that allows you to display your archives in a year-based list.
WPML to Polylang
wpml-to-polylang
Import multilingual data from WPML into Polylang.
WPML Edits Developer Profile
5 plugins · 70 total installs
How We Detect WPML Edits
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wpml-edits/css/style.css/wp-content/plugins/wpml-edits/js/scripts.js/wp-content/plugins/wpml-edits/js/scripts.jsHTML / DOM Fingerprints
wpml_error_msgswpml_success_msgswpml_code_and_name_holderid="old_code_row"id="new_code_row"id="old_name_row"id="new_name_row"id="old_code_both"id="new_code_both"+4 morevar we_plugin_url