Blog Crosspost Security & Risk Analysis

wordpress.org/plugins/blog-crosspost

Automatically add posts from another WordPress website using a shortcode like [blogcrosspost url="example.com"]

40 active installs v0.2.2 PHP 5.6+ WP 4.9+ Updated Aug 6, 2024
blogcrosspostrest
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blog Crosspost Safe to Use in 2026?

Generally Safe

Score 92/100

Blog Crosspost has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The blog-crosspost plugin v0.2.2 exhibits a generally strong security posture based on the static analysis provided. All identified code signals indicate good security practices, with 100% of SQL queries using prepared statements, all output properly escaped, and no dangerous functions, file operations, or external HTTP requests observed directly within the scope of the analysis. The plugin also lacks bundled libraries, mitigating risks associated with outdated dependencies. The attack surface is minimal, consisting solely of one shortcode with no apparent direct vulnerabilities detected through taint analysis.

However, a significant concern arises from the complete absence of nonce checks and capability checks. This indicates a lack of authorization and CSRF protection on potentially sensitive operations, even though no direct vulnerabilities were flagged in the static analysis. The presence of external HTTP requests, while not explicitly flagged as vulnerable, warrants attention as they can be a vector for various attacks if not properly validated and sanitized. The vulnerability history shows no known issues, which is positive, but the lack of any recorded vulnerabilities could also be due to limited historical auditing or the plugin's relative obscurity.

In conclusion, while the plugin demonstrates a good foundation in secure coding for SQL and output handling, the oversight in implementing nonce and capability checks represents a notable weakness. The minimal attack surface and lack of critical findings in static and taint analysis are strengths. The overall risk is moderate, primarily due to the potential for privilege escalation or unauthorized actions if the shortcode's functionality is susceptible to manipulation without proper authorization checks.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

Blog Crosspost Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Blog Crosspost Release Timeline

v0.2.2Current
v0.2.1
v0.2.0
v0.1.0
Code Analysis
Analyzed Mar 16, 2026

Blog Crosspost Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
14 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped14 total outputs
Attack Surface

Blog Crosspost Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[blogcrosspost] blog-crosspost.php:38
Maintenance & Trust

Blog Crosspost Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedAug 6, 2024
PHP min version5.6
Downloads5K

Community Trust

Rating74/100
Number of ratings3
Active installs40
Developer Profile

Blog Crosspost Developer Profile

laurencebahiirwa

5 plugins · 3K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blog Crosspost

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
blogcrosspost-pluginblog-crosspost-itemfeatured-image
HTML Comments
[blogcrosspost]
Data Attributes
data-blogcrosspost-id
REST Endpoints
/wp-json/wp/v2/media/
Shortcode Output
[blogcrosspost url="example.com"]
FAQ

Frequently Asked Questions about Blog Crosspost