iQ Posting Lite Security & Risk Analysis

wordpress.org/plugins/iq-posting-lite

Create a social media funnel to your site in minutes!

0 active installs v1.1.1 PHP 5.2.4+ WP 4.0+ Updated Dec 17, 2019
funnelopengraphsharesocialsocial-media
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is iQ Posting Lite Safe to Use in 2026?

Generally Safe

Score 85/100

iQ Posting Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The iq-posting-lite v1.1.1 plugin exhibits a generally positive security posture, primarily due to the absence of known historical vulnerabilities and the adherence to secure coding practices in several areas. The plugin utilizes prepared statements for all its SQL queries, which is a significant strength, and it also performs nonce checks on its entry points. The static analysis shows a relatively small attack surface with only two AJAX handlers, and importantly, all identified entry points appear to have authentication checks, indicating a deliberate effort to protect against unauthorized access.

However, there are areas that warrant attention. A concerning aspect is the low percentage (38%) of properly escaped outputs. This indicates that user-supplied data or data processed by the plugin may be rendered directly to the browser without sufficient sanitization, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if an attacker can inject malicious code into these unescaped outputs. Additionally, while the plugin makes external HTTP requests, the analysis doesn't specify if these requests are properly secured or if they could be leveraged for SSRF (Server-Side Request Forgery) attacks.

The complete lack of recorded CVEs and past vulnerabilities is a strong indicator that the developers have historically prioritized security or that the plugin has not been a significant target. This is a positive sign. However, it's crucial to remember that the absence of known vulnerabilities does not guarantee complete security. The potential for XSS due to inadequate output escaping remains a notable weakness that could be exploited. In conclusion, while the plugin demonstrates good practices in SQL handling and authentication, the unescaped output is a significant risk that needs to be addressed.

Key Concerns

  • Low percentage of properly escaped output
  • External HTTP requests made
Vulnerabilities
None known

iQ Posting Lite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

iQ Posting Lite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
5
3 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

38% escaped8 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<iq-posting-lite> (iq-posting-lite.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

iQ Posting Lite Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_iq_posting_actioniq-posting-lite.php:34
noprivwp_ajax_iq_posting_actioniq-posting-lite.php:35
WordPress Hooks 11
actionload-post.phpiq-posting-lite.php:32
actionload-post-new.phpiq-posting-lite.php:33
actionadmin_enqueue_scriptsiq-posting-lite.php:36
actionadmin_initiq-posting-lite.php:37
actionadmin_menuiq-posting-lite.php:38
actionadmin_initiq-posting-lite.php:39
actionwp_dashboard_setupiq-posting-lite.php:41
filterplugin_row_metaiq-posting-lite.php:42
actionadmin_noticesiq-posting-lite.php:43
actionwp_enqueue_scriptsiq-posting-lite.php:47
actionadd_meta_boxesiq-posting-lite.php:89
Maintenance & Trust

iQ Posting Lite Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedDec 17, 2019
PHP min version5.2.4
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

iQ Posting Lite Developer Profile

andrew-anderson

2 plugins · 40 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect iQ Posting Lite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/iq-posting-lite/iq-posting-editor.css/wp-content/plugins/iq-posting-lite/iq-posting.css/wp-content/plugins/iq-posting-lite/iq-posting.js
Script Paths
wp-content/plugins/iq-posting-lite/iq-posting.js
Version Parameters
iq-posting-lite/iq-posting.css?ver=iq-posting-lite/iq-posting.js?ver=

HTML / DOM Fingerprints

CSS Classes
iq_posting_erroriq_posting_field
HTML Comments
<!-- The Gutenberg plugin is on. --><!-- It looks like you have the licensed version of iQ Posting installed.<br> We recommend you <b>delete iQ Posting Lite</b> at this point. --><!-- Save Image in Media Library <br /><span class="description">You can manually set it as a Featured Image afterwards</span> --><!-- Add Image as Featured Image -->+1 more
Data Attributes
id="iq_posting_url"name="iq_posting_url"id="iq_posting_image"name="iq_posting_image"id="iq_posting_text"name="iq_posting_text"+21 more
FAQ

Frequently Asked Questions about iQ Posting Lite