WPML Edits Security & Risk Analysis

wordpress.org/plugins/wpml-edits

Edit language code and name in WPML

10 active installs v1.0 PHP + WP 3.2.1+ Updated Oct 3, 2011
change-language-codechange-language-namewpml
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPML Edits Safe to Use in 2026?

Generally Safe

Score 85/100

WPML Edits has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "wpml-edits" plugin v1.0 exhibits a mixed security posture. On the positive side, the static analysis reveals no discovered dangerous functions, no file operations, no external HTTP requests, and all SQL queries are performed using prepared statements, which are strong indicators of good security practices for database interactions. Furthermore, the absence of any recorded vulnerabilities in its history, including CVEs of any severity, suggests a generally stable and well-maintained codebase. However, there are significant areas of concern. The plugin lacks any nonce checks and capability checks, meaning that actions performed by the plugin, if they existed at any entry points, could potentially be exploited by unauthorized users or even through cross-site request forgery if entry points were present. Crucially, 100% of the output escaping is missing, posing a high risk of cross-site scripting (XSS) vulnerabilities if any dynamic data is rendered to the user. The taint analysis also yielded no flows, which is positive but doesn't negate the other identified risks. The limited attack surface (0 entry points) currently mitigates some of these risks, but any future addition of features without addressing the output escaping and authorization checks would significantly increase the plugin's vulnerability.

In conclusion, while the "wpml-edits" plugin v1.0 shows promise with its secure handling of SQL and lack of historical vulnerabilities, the complete absence of output escaping is a critical flaw that leaves it highly susceptible to XSS attacks. The lack of nonce and capability checks also presents a significant security gap. The current low attack surface offers a temporary buffer, but a thorough review and remediation of these identified weaknesses are essential before the plugin can be considered secure for production environments. The strengths lie in its database interactions and historical stability, but the weaknesses in output sanitization and authorization are severe.

Key Concerns

  • All output escaping is missing
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

WPML Edits Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WPML Edits Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

WPML Edits Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
20 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery

SQL Query Safety

100% prepared20 total queries

Output Escaping

0% escaped7 total outputs
Attack Surface

WPML Edits Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptswml-edits.php:44
actionadmin_menuwml-edits.php:53
Maintenance & Trust

WPML Edits Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 3, 2011
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WPML Edits Developer Profile

SimonaIlie

5 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPML Edits

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpml-edits/css/style.css/wp-content/plugins/wpml-edits/js/scripts.js
Script Paths
/wp-content/plugins/wpml-edits/js/scripts.js

HTML / DOM Fingerprints

CSS Classes
wpml_error_msgswpml_success_msgswpml_code_and_name_holder
Data Attributes
id="old_code_row"id="new_code_row"id="old_name_row"id="new_name_row"id="old_code_both"id="new_code_both"+4 more
JS Globals
var we_plugin_url
FAQ

Frequently Asked Questions about WPML Edits