
PilotPress Security & Risk Analysis
wordpress.org/plugins/pilotpressPilotPress allows you to have a website, membership site, customer center, and a partner center integrated together with ONTRAPORT.
Is PilotPress Safe to Use in 2026?
Use With Caution
Score 55/100PilotPress has 2 unpatched vulnerabilities. Evaluate alternatives or apply available mitigations.
The pilotpress plugin exhibits a mixed security posture. While it avoids dangerous functions and file operations, and has a reasonable number of capability checks, significant concerns arise from its unprotected AJAX handlers. A substantial portion of its attack surface is exposed without authentication, creating a direct pathway for potential unauthorized actions. The output escaping is also a major weakness, with a very low percentage of outputs being properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis, although limited in scope, flagged flows with unsanitized paths, reinforcing the XSS concerns. The plugin's vulnerability history, with three known medium-severity CVEs, two of which remain unpatched, further exacerbates these risks. The common types of past vulnerabilities, XSS and missing authorization, directly align with the current findings in the code analysis. This indicates a pattern of recurring security weaknesses that have not been fully addressed. In conclusion, while pilotpress demonstrates some good practices, the high number of unprotected AJAX handlers, poor output escaping, and ongoing unpatched vulnerabilities present a significant security risk that requires immediate attention.
Key Concerns
- Unprotected AJAX handlers
- Low percentage of properly escaped output
- Unpatched CVEs (2 medium severity)
- Flows with unsanitized paths
- Vulnerability history of XSS and Missing Auth
PilotPress Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
PilotPress <= 2.0.36 - Authenticated (Contributor+) Stored Cross-Site Scripting
PilotPress <= 2.0.36 - Missing Authorization
PilotPress <= 2.0.30 - Authenticated(Subscriber+) Missing Authorization via multiple AJAX functions
PilotPress Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
PilotPress Attack Surface
AJAX Handlers 8
Shortcodes 9
WordPress Hooks 76
Maintenance & Trust
PilotPress Maintenance & Trust
Maintenance Signals
Community Trust
PilotPress Alternatives
PilotPress Developer Profile
1 plugin · 1K total installs
How We Detect PilotPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pilotpress/js/jquery-ui.css/wp-content/plugins/pilotpress/js/tracking.js/wp-content/plugins/pilotpress/js/moonrayJS-only-wp-forms.css/wp-content/plugins/pilotpress/js/moonray.css/wp-content/plugins/pilotpress/js/jquery-ui.css/wp-content/plugins/pilotpress/js/tracking.js/wp-content/plugins/pilotpress/js/moonrayJS-only-wp-forms.css/wp-content/plugins/pilotpress/js/moonray.cssHTML / DOM Fingerprints
pilotpress-widgetdata-ppc-formdata-ppc-form-idpilotpress_widget_js[pilotpress_customer_center][pilotpress_partner_center]