Custom Importer & Exporter Security & Risk Analysis

wordpress.org/plugins/custom-importer-exporter

It is a plugin for importing and exporting Term, Post information.

10 active installs v1.0 PHP 5.4+ WP 4.9.8+ Updated Dec 20, 2018
custom-post-typeexportimportterm
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Importer & Exporter Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Importer & Exporter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'custom-importer-exporter' plugin v1.0 exhibits a mixed security posture. On the positive side, there are no registered CVEs, no taint analysis findings, and the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and implementing nonce and capability checks on the limited number of identified code signals. The attack surface appears minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without proper authentication or permission checks. This indicates a cautious approach to exposing functionality.

However, a significant concern arises from the complete lack of output escaping. With 24 total outputs identified and 0% properly escaped, this presents a high risk of cross-site scripting (XSS) vulnerabilities. Any data that is rendered to the user interface, whether user-provided or from the database, is susceptible to malicious injection. The presence of two file operations also warrants careful review to ensure these operations are not exploitable in conjunction with the unescaped output or other potential vulnerabilities not immediately apparent in this static analysis.

While the plugin's vulnerability history is clean, this should not be interpreted as a guarantee of absolute security, especially given the critical flaw in output escaping. The absence of past vulnerabilities might be due to the plugin's age, limited usage, or simply the limited scope of the static analysis performed. The combination of unescaped output and potential file operations creates a tangible risk that needs immediate attention.

Key Concerns

  • Output escaping is completely missing
  • Presence of file operations without further context
Vulnerabilities
None known

Custom Importer & Exporter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Custom Importer & Exporter Release Timeline

v1.0.0
Code Analysis
Analyzed Apr 16, 2026

Custom Importer & Exporter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
0 escaped
Nonce Checks
2
Capability Checks
2
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped24 total outputs
Attack Surface

Custom Importer & Exporter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menucustom-importer-exporter.php:32
Maintenance & Trust

Custom Importer & Exporter Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 20, 2018
PHP min version5.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom Importer & Exporter Developer Profile

Protech

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Importer & Exporter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-importer-exporter/css/custom-importer-exporter.css

HTML / DOM Fingerprints

CSS Classes
box_wrapboxcontentsbutton_wrap
Data Attributes
name="export_posttype[]"name="page"value="custom-importer-exporter-post-type"name="download"value="true"type="submit"+1 more
FAQ

Frequently Asked Questions about Custom Importer & Exporter