AV csv 2 posts Security & Risk Analysis

wordpress.org/plugins/av-csv-2-posts

Importar archivos CSV y convertirlos en Posts. Seleccionar campos, autor, post_type, imagen destacada, campos personalizados, categorías...

10 active installs v1.0 PHP + WP 3.x+ Updated Feb 15, 2012
bbddcsvimportposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AV csv 2 posts Safe to Use in 2026?

Generally Safe

Score 85/100

AV csv 2 posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'av-csv-2-posts' plugin v1.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all its SQL queries and has no recorded vulnerabilities or CVEs. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface, and there are no external HTTP requests or bundled libraries to consider.

However, the static analysis reveals critical areas of concern. The plugin has 3 file operations, and importantly, all 3 taint analysis flows have unsanitized paths. This, coupled with a very low percentage (7%) of properly escaped output across 30 total outputs, indicates a high risk of vulnerabilities such as arbitrary file read/write or directory traversal. The complete lack of nonce checks and capability checks further exacerbates these risks, allowing potentially malicious actions to be performed without proper authorization or validation.

Given the lack of past vulnerabilities, one might infer a history of secure development, but the current static analysis paints a worrying picture. The combination of unsanitized path flows and poor output escaping, along with a failure to implement essential security checks like nonces and capability checks, presents a significant risk. While the plugin is free from known CVEs, its current codebase contains fundamental security weaknesses that require immediate attention to prevent potential exploitation.

Key Concerns

  • Unsanitized paths in taint flows
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
  • File operations present
Vulnerabilities
None known

AV csv 2 posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AV csv 2 posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

7% escaped30 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
avit_form_csv (classes\av_import_csv.class.php:238)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AV csv 2 posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initav-csv-2-posts.php:27
actionadmin_menuav-csv-2-posts.php:28
Maintenance & Trust

AV csv 2 posts Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedFeb 15, 2012
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

AV csv 2 posts Developer Profile

xiaobai_wp

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AV csv 2 posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/av-csv-2-posts/css/avit.css/wp-content/plugins/av-csv-2-posts/js/avit.js
Script Paths
/wp-content/plugins/av-csv-2-posts/js/avit.js

HTML / DOM Fingerprints

CSS Classes
avit_menuav_wrap
Data Attributes
data-avit_id
FAQ

Frequently Asked Questions about AV csv 2 posts