eXopin Blogging For Money Security & Risk Analysis

wordpress.org/plugins/exopin-blogging-for-money

Now you can sell your blog articles direct to customers using eXopin, a free plug-in which collects payment and seamlessly transfers content.

10 active installs v3.5.5 PHP + WP 3.0.0+ Updated Jun 4, 2013
earnmoneypostselltext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is eXopin Blogging For Money Safe to Use in 2026?

Generally Safe

Score 85/100

eXopin Blogging For Money has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The exopin-blogging-for-money plugin v3.5.5 exhibits a mixed security posture. While it demonstrates good practices by using prepared statements for all SQL queries and avoiding external HTTP requests or file operations, several significant concerns are highlighted by the static analysis. The plugin uses the dangerous `unserialize` function six times, which is a known vector for object injection vulnerabilities if not handled with extreme care. Furthermore, the taint analysis reveals 12 flows with unsanitized paths, with 9 of these being of high severity. This indicates a substantial risk of data being processed or used in unintended ways, potentially leading to code execution or unauthorized access, despite the absence of critical severity flows. The complete lack of known CVEs and a clean vulnerability history is a positive sign, suggesting either diligent development or a lack of historical exploitation, but it does not negate the risks identified in the current code. In conclusion, the plugin's strengths lie in its database query security and avoidance of external interactions, but the heavy reliance on `unserialize` and the numerous high-severity unsanitized taint flows present a considerable risk that requires immediate attention.

Key Concerns

  • High severity unsanitized taint flows
  • Use of dangerous unserialize function
  • Low percentage of properly escaped output
  • Missing nonce checks
Vulnerabilities
None known

eXopin Blogging For Money Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

eXopin Blogging For Money Code Analysis

Dangerous Functions
6
Raw SQL Queries
0
0 prepared
Unescaped Output
129
53 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$arr_val = unserialize( base64_decode( $_POST['exopin-mister-data'] ) );exopin-buyer-admin.php:26
unserialize$arr_mister_data = unserialize( base64_decode( $_POST['exopin-mister-data'] ) );exopin-merchant-admin.php:146
unserialize$arr_val = unserialize( base64_decode( $_POST['exopin-mister-data'] ) );exopin-merchant-admin.php:283
unserialize$arr_val = unserialize( base64_decode( $_POST['exopin-mister-data'] ) );exopin-settings-admin.php:27
unserialize$arr_val = unserialize( base64_decode( $_REQUEST['exopin-mister-data'] ) );exopin-start.php:74
unserialize$arr_val = unserialize( base64_decode( $_POST['exopin-mister-data'] ) );exopin-start.php:219

Output Escaping

29% escaped182 total outputs
Data Flows
12 unsanitized

Data Flow Analysis

13 flows12 with unsanitized paths
purchases_loading (exopin-buyer-admin.php:100)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

eXopin Blogging For Money Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionplugins_loadedexopin-start.php:13
actiongenesis_before_post_contentexopin-start.php:31
filterthe_contentexopin-start.php:32
filterthe_titleexopin-start.php:33
actionadmin_menuexopin-start.php:37
actionwp_headexopin-start.php:39
actionadmin_headexopin-start.php:50
actionadmin_noticesexopin-start.php:51
actionsave_postexopin-start.php:53
actiondelete_postexopin-start.php:54
actiontrash_postexopin-start.php:55
actionadd_meta_boxesexopin-start.php:57
actionadmin_noticesexopin-start.php:267
Maintenance & Trust

eXopin Blogging For Money Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJun 4, 2013
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

eXopin Blogging For Money Developer Profile

tradebit

3 plugins · 30 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect eXopin Blogging For Money

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/exopin-blogging-for-money/exopin-buyer.js/wp-content/plugins/exopin-blogging-for-money/exopin-merchant.js/wp-content/plugins/exopin-blogging-for-money/exopin-merchant-admin.js/wp-content/plugins/exopin-blogging-for-money/exopin-admin.js/wp-content/plugins/exopin-blogging-for-money/exopin-admin.css
Script Paths
/wp-content/plugins/exopin-blogging-for-money/exopin-buyer.js/wp-content/plugins/exopin-blogging-for-money/exopin-merchant.js/wp-content/plugins/exopin-blogging-for-money/exopin-merchant-admin.js/wp-content/plugins/exopin-blogging-for-money/exopin-admin.js
Version Parameters
exopin-blogging-for-money/exopin-buyer.js?ver=exopin-blogging-for-money/exopin-merchant.js?ver=exopin-blogging-for-money/exopin-merchant-admin.js?ver=exopin-blogging-for-money/exopin-admin.js?ver=exopin-blogging-for-money/exopin-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
exopin-buy-buttonexopin-buy-button-linkexopin-post-optionsexopin-display-destination
HTML Comments
<!-- html-head-meta -->
Data Attributes
data-exopin-meta-srcdata-exopin-post-iddata-exopin-post-contentdata-exopin-pricedata-exopin-currencydata-exopin-user-id+1 more
JS Globals
exopin_merchant_data
Shortcode Output
[exopin-content][exopin-destination][exopin-buy-button][exopin-extra-info]
FAQ

Frequently Asked Questions about eXopin Blogging For Money