If Tag Then Post WordPress Security & Risk Analysis

wordpress.org/plugins/ifttp-wp

Like the popular tool IFTTT, this plugin allows you to trigger conditional actions on posts based on tags.

10 active installs v0.1 PHP + WP 4+ Updated Nov 19, 2015
contidional-actionsifttpiftttmobile-appplugin-postposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is If Tag Then Post WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

If Tag Then Post WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of "ifttp-wp" v0.1 reveals a generally strong security posture at first glance. The plugin reports zero AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal attack surface. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and the exclusive use of prepared statements for SQL queries are positive indicators. The lack of known CVEs and a clean vulnerability history also contribute to this perception of safety.

However, several critical concerns emerge. The complete absence of nonce checks and capability checks across all entry points (even though there are currently zero reported) is a significant weakness. This means that if any entry points were to be introduced in future versions or if the current analysis missed something, they would be entirely unprotected against CSRF and unauthorized access. While the current code does not present any direct vulnerabilities from taint analysis or raw SQL, this lack of fundamental security mechanisms leaves the plugin susceptible to potential future exploitation. The partial output escaping (75%) is also a minor concern, as the remaining unescaped outputs could be exploited for XSS if user-supplied data is ever incorporated into those outputs.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
  • Unescaped output present (25%)
Vulnerabilities
None known

If Tag Then Post WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

If Tag Then Post WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

If Tag Then Post WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionsave_postifttp-wp.php:27
actionadmin_menuinc\plugin-settings.php:15
actionadmin_initinc\plugin-settings.php:16
actionadmin_enqueue_scriptsinc\plugin-settings.php:17
Maintenance & Trust

If Tag Then Post WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 19, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

If Tag Then Post WordPress Developer Profile

Jack Reichert

6 plugins · 180 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect If Tag Then Post WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ifttp-wp/css/admin-styles.css/wp-content/plugins/ifttp-wp/js/admin-scripts.js
Script Paths
/wp-content/plugins/ifttp-wp/js/admin-scripts.js
Version Parameters
ifttp_admin_scriptifttp_admin_style

HTML / DOM Fingerprints

CSS Classes
ifttp
Data Attributes
id="ifttp_if_tag"id="ifttp_else_post"
FAQ

Frequently Asked Questions about If Tag Then Post WordPress