CR Post to Ping.fm Security & Risk Analysis

wordpress.org/plugins/cr-post2pingfm

NEW FEATURE IN THIS RELEASE

10 active installs v1.0.1 PHP + WP 2.9.2+ Updated Feb 17, 2011
ping-fmpublish
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CR Post to Ping.fm Safe to Use in 2026?

Generally Safe

Score 85/100

CR Post to Ping.fm has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The cr-post2pingfm v1.0.1 plugin presents a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and includes nonce and capability checks, indicating an awareness of common WordPress security vulnerabilities. The absence of any known CVEs further contributes to a seemingly stable history.

However, significant concerns arise from the static code analysis. The plugin exposes one AJAX handler without any authentication checks, creating a direct entry point for unauthenticated attackers. Furthermore, a substantial portion of its output (100%) is not properly escaped, which opens the door to cross-site scripting (XSS) vulnerabilities if any user-supplied data is reflected in the output. The taint analysis reveals three flows with unsanitized paths, suggesting potential for privilege escalation or other attacks if these flows interact with sensitive operations or are exploitable via the unauthenticated AJAX endpoint.

While the vulnerability history is clean, this may be due to the plugin's limited exposure or the specific nature of the discovered code weaknesses not yet being publicly documented. The combination of an unauthenticated entry point and unescaped output constitutes a considerable risk, outweighing the positive aspects of its SQL handling and historical lack of CVEs. Further investigation into the specific unescaped outputs and taint flows is highly recommended.

Key Concerns

  • AJAX handler without authentication
  • 100% of outputs are unescaped
  • 3 flows with unsanitized paths
Vulnerabilities
None known

CR Post to Ping.fm Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CR Post to Ping.fm Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
25
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

0% escaped25 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
cr_post_2_pingfm_ajax_test_handler (cr-post-2-pingfm.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

CR Post to Ping.fm Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_cr_post_2_pingfm_ajax_testcr-post-2-pingfm.php:35
WordPress Hooks 8
actionpublish_postcr-post-2-pingfm.php:13
actionadmin_menucr-post-2-pingfm.php:14
actionedit_category_form_fieldscr-post-2-pingfm.php:16
actionedit_categorycr-post-2-pingfm.php:17
actioninitcr-post-2-pingfm.php:19
actionadmin_noticescr-post-2-pingfm.php:31
actionadmin_headcr-post-2-pingfm.php:61
actionsave_postcr-post-2-pingfm.php:89
Maintenance & Trust

CR Post to Ping.fm Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedFeb 17, 2011
PHP min version
Downloads14K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CR Post to Ping.fm Developer Profile

Arief Bayu Purwanto

4 plugins · 40 total installs

92
trust score
Avg Security Score
89/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect CR Post to Ping.fm

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cr-post2pingfm/css/style.css/wp-content/plugins/cr-post2pingfm/js/cr-post2pingfm.js
Script Paths
/wp-content/plugins/cr-post2pingfm/js/cr-post2pingfm.js
Version Parameters
cr-post2pingfm/css/style.css?ver=cr-post2pingfm/js/cr-post2pingfm.js?ver=

HTML / DOM Fingerprints

CSS Classes
crpost2pingfm-warning
Data Attributes
name="cr_post_2_pingfm_custom_message"name="_cr_post_2_pingfm_dont_ping_this_post"name="cr_post_2_pingfm_custom_message_send_on_update"id="cr_post_2_pingfm_custom_message_nonce"id="cr_ping_connection_method_selected"id="cr_ping_message"+1 more
JS Globals
cr_post2pingfm_submit_testingset_connect_methodcr_post2pingfm_ajax_test
REST Endpoints
/wp-json/cr-post2pingfm/
FAQ

Frequently Asked Questions about CR Post to Ping.fm