AEIOU Security & Risk Analysis

wordpress.org/plugins/aeiou

Make a full user backup, restore wherever you want!

10 active installs v0.7 PHP + WP 3.4+ Updated Jan 22, 2013
exportimportmetadatauserusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AEIOU Safe to Use in 2026?

Generally Safe

Score 85/100

AEIOU has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'aeiou' plugin v0.7 exhibits a generally strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and all identified SQL queries are properly prepared, mitigating risks of SQL injection. The plugin also avoids making external HTTP requests and does not appear to bundle any external libraries, which are positive security indicators.

However, there are notable areas for concern. The analysis reveals two taint flows with unsanitized paths, indicating potential vulnerabilities if these flows are reachable through user input. Furthermore, a significant weakness is the lack of proper output escaping, with only 4% of outputs being correctly escaped. This widespread issue presents a high risk of cross-site scripting (XSS) vulnerabilities, as untrusted data could be rendered directly in the browser.

The vulnerability history is entirely clean, with no recorded CVEs. While this is a positive sign, it must be considered alongside the identified code-level risks. The lack of past vulnerabilities might be due to the plugin's limited functionality or simply a lack of past security audits. The absence of nonce and capability checks, particularly in conjunction with the identified taint flows and poor output escaping, suggests that even if the attack surface were larger, there are insufficient security controls in place.

Key Concerns

  • Unsanitized paths in taint flows
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

AEIOU Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AEIOU Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
7 prepared
Unescaped Output
24
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared7 total queries

Output Escaping

4% escaped25 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
addImportMetabox (index.php:310)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AEIOU Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initindex.php:50
actionadmin_menuindex.php:51
Maintenance & Trust

AEIOU Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 22, 2013
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

AEIOU Developer Profile

tosend.it

2 plugins · 20 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AEIOU

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Export made with Wordpress AEIOU by toSend.it di Luisa Marra (http://tosend.it/) -->
Data Attributes
keyoptionglobalbase_idgroupname
FAQ

Frequently Asked Questions about AEIOU