OPS Old Post Spinner Security & Risk Analysis

wordpress.org/plugins/old-post-spinner

Create a complete unique new post on a random old one and promote it to the top of your blog.

10 active installs v2.4.0 PHP + WP 2.9+ Updated Jul 6, 2011
postpostspromotionrssseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OPS Old Post Spinner Safe to Use in 2026?

Generally Safe

Score 85/100

OPS Old Post Spinner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'old-post-spinner' v2.4.0 plugin exhibits a generally good security posture, with no known vulnerabilities in its history and a promising lack of critical findings in static analysis. The absence of external HTTP requests, dangerous functions, and no critical or high severity taint flows are strong indicators of secure coding practices. The plugin also demonstrates an effort towards security with the presence of nonces and capability checks, alongside a reasonable percentage of SQL queries utilizing prepared statements.

However, there are areas for improvement that introduce minor risks. The most significant concern is the extremely low percentage (5%) of properly escaped output. This widespread lack of output escaping, despite a substantial number of output operations, significantly increases the risk of cross-site scripting (XSS) vulnerabilities. While the attack surface is currently minimal and appears to be protected, a lack of robust output sanitization could make it a target for attackers if new entry points are introduced or if existing ones are overlooked.

In conclusion, the plugin is currently in a good state, largely due to its clean vulnerability history and the absence of critical static analysis findings. The limited attack surface and basic security checks are positive. The primary weakness lies in the inadequate handling of output, which requires immediate attention to mitigate potential XSS risks. Addressing this output escaping issue would further strengthen the plugin's overall security.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

OPS Old Post Spinner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

OPS Old Post Spinner Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
7 prepared
Unescaped Output
58
3 escaped
Nonce Checks
1
Capability Checks
3
File Operations
6
External Requests
0
Bundled Libraries
0

SQL Query Safety

70% prepared10 total queries

Output Escaping

5% escaped61 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
ops_options (OPS_admin.php:64)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

OPS Old Post Spinner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionops_task_hookOldPostSpinner.php:60
actioninitOldPostSpinner.php:61
actionadmin_menuOldPostSpinner.php:62
actionadmin_menuOldPostSpinner.php:63
actionadmin_noticesOldPostSpinner.php:64
actionadmin_headOldPostSpinner.php:65
actionsave_postOldPostSpinner.php:66
filterthe_contentOldPostSpinner.php:67

Scheduled Events 1

ops_task_hook
Maintenance & Trust

OPS Old Post Spinner Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedJul 6, 2011
PHP min version
Downloads14K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

OPS Old Post Spinner Developer Profile

Juergen Schulze

6 plugins · 1K total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OPS Old Post Spinner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/old-post-spinner/css/old_post_spinner.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about OPS Old Post Spinner