Create Post by Google Document Security & Risk Analysis

wordpress.org/plugins/create-post-by-google-document

Sync Google Docs with WordPress to create posts.

10 active installs v1.0.0 PHP + WP 5.0+ Updated Jul 4, 2025
google-docsgoogle-docs-apipost-synchronizationwordpress-posts
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Create Post by Google Document Safe to Use in 2026?

Generally Safe

Score 100/100

Create Post by Google Document has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The 'create-post-by-google-document' plugin v1.0.0 demonstrates a mixed security posture. On the positive side, it has a very small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed. Furthermore, all SQL queries are properly prepared, and external HTTP requests are present but not directly flagged as a risk in the provided data. The plugin also incorporates nonce checks and a reasonable percentage of output escaping, indicating some adherence to WordPress security best practices.

However, several concerns warrant attention. The presence of the 'unserialize' function is a significant red flag, as it can be a vector for remote code execution if used with untrusted input. While taint analysis shows no critical or high severity flows, the two identified flows with unsanitized paths coupled with the 'unserialize' function represent a potential risk, especially if these paths lead to the unserialization process. The lack of capability checks on any entry points, though the entry points are currently zero, means that if new entry points were introduced without proper authorization checks, it could create vulnerabilities.

With no recorded vulnerability history (CVEs), the plugin appears to have a clean past. This, combined with the limited attack surface and good SQL handling, suggests a developer who is aware of some security principles. Nevertheless, the 'unserialize' function and the presence of unsanitized paths, despite the current lack of exploitable taint flows, mean the plugin is not entirely risk-free. Diligence in code review and potential sanitization of inputs before 'unserialize' would be crucial.

Key Concerns

  • Dangerous function: unserialize used
  • Flows with unsanitized paths detected
  • No capability checks on entry points
  • Output escaping not fully implemented (21%)
Vulnerabilities
None known

Create Post by Google Document Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Create Post by Google Document Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
16
62 escaped
Nonce Checks
5
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$token = unserialize($cpbgd_api_token);admin\class-cpbgd-post-by-google-document-admin.php:216

Output Escaping

79% escaped78 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
cpbgd_api_settings_page (admin\class-cpbgd-post-by-google-document-admin.php:117)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Create Post by Google Document Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitadmin\class-cpbgd-post-by-google-document-admin.php:36
actionadmin_menuadmin\class-cpbgd-post-by-google-document-admin.php:38
actionadmin_enqueue_scriptsincludes\class-cpbgd-post-by-google-document.php:130
Maintenance & Trust

Create Post by Google Document Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 4, 2025
PHP min version
Downloads361

Community Trust

Rating86/100
Number of ratings6
Active installs10
Developer Profile

Create Post by Google Document Developer Profile

Lalit Yadav

3 plugins · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Create Post by Google Document

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/create-post-by-google-document/admin/css/cpbgd-post-by-google-document-admin.css
Version Parameters
create-post-by-google-document/admin/css/cpbgd-post-by-google-document-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
cpbgd-post-by-google-document-admin-css
Data Attributes
data-action="cpbgd_upload_doc"data-nonce="cpbgd_upload_doc_nonce"
JS Globals
window.cpbgd_upload_doc_nonce
FAQ

Frequently Asked Questions about Create Post by Google Document