
Export Post Info Security & Risk Analysis
wordpress.org/plugins/export-post-infoThis plugin exports posts Date published, Post title, Word Count, Status, URL and Category to a CSV file.
Is Export Post Info Safe to Use in 2026?
Mostly Safe
Score 84/100Export Post Info is generally safe to use though it hasn't been updated recently. 2 past CVEs were resolved. Keep it updated.
The 'export-post-info' plugin v1.3.0 exhibits a mixed security posture. On the positive side, static analysis reveals no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks. The code also demonstrates good practices with 100% of SQL queries utilizing prepared statements, and a single file operation and capability check are present. However, a significant concern arises from the output escaping, where 60% of the 20 total outputs are properly escaped, leaving 40% potentially vulnerable to injection or XSS attacks if the unsanitized output is processed by downstream components or rendered directly in the browser. Taint analysis did not uncover any flows with unsanitized paths, which is a positive indicator.
The vulnerability history of this plugin is a notable area of concern. With two known medium-severity CVEs, both related to 'Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')' and 'Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')', it suggests a pattern of insecure output handling or input sanitization. The fact that these were the common vulnerability types and the last one occurred in September 2022 indicates a recurring issue that may not have been fully addressed in this version, despite there being no currently unpatched CVEs. The lack of recent patching history for these specific vulnerability types is a red flag.
In conclusion, while the plugin has a minimal attack surface and uses prepared statements for SQL, the concerning percentage of unescaped output and the history of injection and XSS vulnerabilities indicate potential risks. The plugin has strengths in its limited entry points and SQL practices but weaknesses in output sanitization and a history of exploitable flaws that warrant careful consideration. Users should exercise caution and ensure proper output handling within their WordPress environment.
Key Concerns
- Significant portion of outputs not properly escaped
- History of 2 medium severity vulnerabilities (Injection/XSS)
Export Post Info Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Export Post Info <= 1.2.0 - Authenticated (Author+) CSV Injection
Export Post Info <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting
Export Post Info Code Analysis
Output Escaping
Export Post Info Attack Surface
WordPress Hooks 3
Maintenance & Trust
Export Post Info Maintenance & Trust
Maintenance Signals
Community Trust
Export Post Info Developer Profile
28 plugins · 61K total installs
How We Detect Export Post Info
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/export-post-info/css/style.cssexport-post-info/css/style.css?ver=HTML / DOM Fingerprints
wrappostbox-containermetabox-holderpostboxform-tableid="epi_random_string_filename"