Docs to WordPress Security & Risk Analysis

wordpress.org/plugins/docs-to-wordpress

Easily move posts from Google Docs to WordPress

10 active installs v1.1 PHP + WP 3.7+ Updated Sep 30, 2015
docsgooglegoogle-docssyndication
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Docs to WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Docs to WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The docs-to-wordpress plugin v1.1 exhibits several concerning security practices despite having no recorded historical vulnerabilities. The most significant weakness lies in its attack surface, with one AJAX handler lacking any authentication checks. This creates a direct pathway for unauthenticated users to potentially interact with plugin functionality, which is a critical security risk. Furthermore, the complete absence of nonce and capability checks on any entry points means that even if an AJAX handler were properly secured in other ways, it would still be vulnerable to CSRF attacks and privilege escalation if malicious actors could trigger it.

The code analysis also reveals a critical flaw in output escaping, with 0% of outputs being properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the WordPress site through this plugin. While the plugin uses prepared statements for its SQL queries, demonstrating good practice in that area, the lack of output sanitization and the unprotected entry points severely undermine its overall security posture. The taint analysis also noted flows with unsanitized paths, although without specific severity, it's difficult to gauge their immediate impact without further investigation. The absence of past vulnerabilities is a positive sign, but it does not negate the current risks identified in the code.

In conclusion, while the plugin shows some good practices like using prepared SQL statements, the presence of an unprotected AJAX handler, complete lack of capability checks, and widespread unescaped output present significant and actionable security risks. These issues require immediate attention to prevent potential exploitation.

Key Concerns

  • Unprotected AJAX handler
  • No capability checks
  • No nonce checks
  • Unescaped output
  • Unsanitized paths in taint flows
Vulnerabilities
None known

Docs to WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Docs to WordPress Release Timeline

v1.1Current
v1.0-beta
v0.4-beta
v0.3-beta
v0.1-beta
Code Analysis
Analyzed Mar 17, 2026

Docs to WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

0% escaped6 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
saveSettings (options-ajax.php:13)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Docs to WordPress Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_docs_to_wp_save_optionsoptions-ajax.php:9
WordPress Hooks 11
actionadmin_noticesdocs-to-wp.php:278
actionadmin_menudocs-to-wp.php:279
filterpre_docs_to_wp_stripextend-clean.php:10
filterpre_docs_to_wp_insertextend-clean.php:40
filterpre_docs_to_wp_purifyextend-clean.php:50
actionadd_meta_boxesextend-clean.php:94
filtercron_schedulesextend-cron.php:10
actiondtwp_cronjobextend-cron.php:23
filterpre_docs_to_wp_insertextend-headline.php:9
actionadmin_initoptions-ajax.php:40
actionadmin_enqueue_scriptsoptions.php:20

Scheduled Events 1

dtwp_cronjob
Maintenance & Trust

Docs to WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedSep 30, 2015
PHP min version
Downloads11K

Community Trust

Rating80/100
Number of ratings8
Active installs10
Developer Profile

Docs to WordPress Developer Profile

William P. Davis

4 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Docs to WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/docs-to-wordpress/css/style.css
Script Paths
/wp-content/plugins/docs-to-wordpress/js/script.js
Version Parameters
docs-to-wordpress/css/style.css?ver=docs-to-wordpress/js/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- If you have a hardcoded origin and destination, force that here, and update options page to reflect as much. --><!-- Cloned from get_user_by --><!-- If you overrode the instance type in docs_to_wp_purifier_filter, you will need to activate it in docs_to_wp_custom_purifier. --><!-- Find out if we are creating a draft or updating a doc -->+10 more
Data Attributes
docs_to_wp_client_iddocs_to_wp_client_secretdocs_to_wp_origindocs_to_wp_targetdocs_to_wp_auth_token
FAQ

Frequently Asked Questions about Docs to WordPress