
WPS Mypace CTT Adapter Security & Risk Analysis
wordpress.org/plugins/wps-mypace-ctt-adapterMypace Custom Title Tag support for WP SiteManager.
Is WPS Mypace CTT Adapter Safe to Use in 2026?
Generally Safe
Score 85/100WPS Mypace CTT Adapter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wps-mypace-ctt-adapter" plugin v0.2.1 exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities in its history, which is a strong indicator of diligence. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are excellent security practices. However, the static analysis reveals critical concerns. The presence of the `passthru` function is a significant red flag, as it can be exploited for command injection if used with unsanitized input. The extremely low percentage of properly escaped output (14%) suggests a high risk of cross-site scripting (XSS) vulnerabilities, as data displayed to users is likely not being adequately sanitized. Additionally, the complete lack of nonce and capability checks on any potential entry points (though none are currently identified) means that if new entry points are introduced or discovered, they would be entirely unprotected.
While the plugin has a clean vulnerability history, this cannot entirely offset the inherent risks identified in the code analysis. The presence of `passthru` and the widespread lack of output escaping are serious vulnerabilities that could be exploited. The plugin's very limited attack surface is a strength, but the identified code-level weaknesses present a significant risk. Future development should prioritize sanitizing all inputs used with `passthru` and implementing robust output escaping across all data displayed to users. The lack of any capability checks is a concern for any plugin that might handle sensitive operations, even if no such operations are currently apparent.
Key Concerns
- Dangerous function 'passthru' detected
- Low percentage of properly escaped output
- Missing nonce checks
- Missing capability checks
WPS Mypace CTT Adapter Security Vulnerabilities
WPS Mypace CTT Adapter Release Timeline
WPS Mypace CTT Adapter Code Analysis
Dangerous Functions Found
Output Escaping
WPS Mypace CTT Adapter Attack Surface
WordPress Hooks 3
Maintenance & Trust
WPS Mypace CTT Adapter Maintenance & Trust
Maintenance Signals
Community Trust
WPS Mypace CTT Adapter Alternatives
Auto Image Attributes From Filename With Bulk Updater (Add Alt Text, Image Title For Image SEO)
auto-image-attributes-from-filename-with-bulk-updater
Automatically add Image Alt Text, Title, Caption and Description from Filename. Bulk update existing images. Great for Image SEO and Accessibility.
Simple SEO
cds-simple-seo
Allows the modification of META titles, descriptions and keywords for all pages and posts. Also allows for default setting for of META title, descript …
Smart SEO Tool – SEO优化插件
smart-seo-tool
Smart SEO Tool是一款专门针对WordPress开发的智能SEO优化插件,与众多WordPress的SEO插件不一样的是,Smart SEO Tool更加简单易用,帮助站长快速完成WordPress博客/网站的SEO基础优化。
HeadSpace2 SEO
headspace2
Controls almost every aspect of your site's meta-data, including advanced tagging, Analytics, and dozens of plugins. The best WordPress SEO solu …
Headline Analyzer
headline-analyzer
Headline Studio WordPress plugin allows you to easily analyze & improve your headlines as you create content in WordPress
WPS Mypace CTT Adapter Developer Profile
23 plugins · 216K total installs
How We Detect WPS Mypace CTT Adapter
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
mypace_title_tag