Blog To HTML Security & Risk Analysis

wordpress.org/plugins/blog-to-html

Export all posts in your blog to a HTML file for ebook creation.

50 active installs v1.91 PHP + WP 4.6+ Updated Mar 7, 2020
ebookexporthtml
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blog To HTML Safe to Use in 2026?

Generally Safe

Score 85/100

Blog To HTML has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "blog-to-html" plugin v1.91 presents a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities, file operations, and external HTTP requests are strong positive indicators. The presence of a capability check, even for a single entry point, is also a good practice. The total lack of known CVEs further reinforces a history of security consciousness or fortunate obscurity.

However, there are areas for improvement. The most significant concern is the 50% of output escaping, meaning half of the plugin's outputs are not properly sanitized, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is involved. Additionally, the absence of nonce checks, especially if the single shortcode could potentially interact with server-side actions, represents a missed opportunity for preventing Cross-Site Request Forgery (CSRF) attacks. While the attack surface is small, the lack of explicit authorization checks on all entry points, particularly if dynamic content is handled, warrants careful consideration.

In conclusion, "blog-to-html" v1.91 is a relatively safe plugin due to its minimal attack surface and lack of critical vulnerabilities in its history and static analysis. The strengths lie in its avoidance of common dangerous code patterns. The primary weakness lies in the incomplete output escaping, which needs to be addressed to fully mitigate XSS risks. The missing nonce checks also represent a potential area of concern for CSRF.

Key Concerns

  • Half of outputs are not properly escaped
  • Missing nonce checks on entry points
Vulnerabilities
None known

Blog To HTML Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blog To HTML Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped8 total outputs
Attack Surface

Blog To HTML Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gallery] blog_to_html.php:75
WordPress Hooks 9
actionadmin_initblog_to_html.php:55
actionadmin_noticesblog_to_html.php:56
actionnetwork_admin_initblog_to_html.php:57
actionnetwork_admin_noticesblog_to_html.php:58
actionadmin_initblog_to_html.php:71
filteradmin_footer_textblog_to_html.php:92
filterupdate_footerblog_to_html.php:93
actionadmin_menublog_to_html.php:113
filterimg_caption_shortcodeblog_to_html.php:329
Maintenance & Trust

Blog To HTML Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 7, 2020
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings3
Active installs50
Developer Profile

Blog To HTML Developer Profile

Rick Hellewell

16 plugins · 1K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blog To HTML

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blog-to-html/css/blogtohtml.css/wp-content/plugins/blog-to-html/js/blogtohtml.js
Script Paths
/wp-content/plugins/blog-to-html/js/blogtohtml.js
Version Parameters
blog-to-html/css/blogtohtml.css?ver=blog-to-html/js/blogtohtml.js?ver=

HTML / DOM Fingerprints

CSS Classes
blog2html_h1blog2html_h2blog2html_divblog2html_p
FAQ

Frequently Asked Questions about Blog To HTML