Post Cloner Security & Risk Analysis

wordpress.org/plugins/post-cloner

Post cloner allows you to easily make complete duplicates of any post on your site. That includes posts, pages and custom post types.

1K active installs v1.0.0 PHP + WP 3.5+ Updated Dec 13, 2023
clonecopyduplicatepostposts
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEDec 5, 2025
Download
Safety Verdict

Is Post Cloner Safe to Use in 2026?

Use With Caution

Score 63/100

Post Cloner has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Dec 5, 2025Updated 2yr ago
Risk Assessment

The 'post-cloner' plugin version 1.0.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries, includes a nonce check, and a capability check. Furthermore, the static analysis shows a remarkably small attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication.

However, significant concerns arise from the presence of the `unserialize` function, which is a known vector for remote code execution if used with untrusted input. The taint analysis indicates one flow with an unsanitized path, although it's not classified as critical or high severity. Coupled with this, the plugin has a history of known vulnerabilities, with one medium severity issue currently unpatched. The fact that the last vulnerability was so recent (December 2025) suggests a pattern of security weaknesses that may not be fully addressed by the development team.

In conclusion, while the plugin's minimal attack surface and use of prepared statements are strengths, the presence of `unserialize`, an unsanitized taint flow, and an unpatched vulnerability present notable risks. The potential for misuse of `unserialize` combined with the historical vulnerability record warrants careful consideration and immediate attention to the unpatched CVE.

Key Concerns

  • Unpatched CVE (medium severity)
  • Dangerous function: unserialize
  • Flows with unsanitized paths
  • Low output escaping (17%)
  • Bundled outdated library: Select2 v3.5.4
Vulnerabilities
1

Post Cloner Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-62865medium · 5.3Missing Authorization

Post Cloner <= 1.0.0 - Missing Authorization

Dec 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Post Cloner Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
5
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserializeupdate_post_meta( $new_post, $meta_data, unserialize( $meta_text ) );wp-post-cloner.php:232

Bundled Libraries

Select23.5.4

Output Escaping

17% escaped6 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
clone_dat_page_admin_notice (wp-post-cloner.php:257)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Cloner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitwp-post-cloner.php:25
actionadmin_noticeswp-post-cloner.php:27
actionadmin_menuwp-post-cloner.php:29
actionadmin_initwp-post-cloner.php:31
actionadmin_enqueue_scriptswp-post-cloner.php:33
Maintenance & Trust

Post Cloner Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 13, 2023
PHP min version
Downloads24K

Community Trust

Rating96/100
Number of ratings9
Active installs1K
Developer Profile

Post Cloner Developer Profile

Evan Herman

15 plugins · 136K total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
375 days
View full developer profile
Detection Fingerprints

How We Detect Post Cloner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-cloner/style.css/wp-content/plugins/post-cloner/js/post-cloner.js
Script Paths
/wp-content/plugins/post-cloner/js/post-cloner.js
Version Parameters
post-cloner/style.css?ver=post-cloner/js/post-cloner.js?ver=

HTML / DOM Fingerprints

Data Attributes
name="cloneable_post_types"id="select_cloneable_post_types"
FAQ

Frequently Asked Questions about Post Cloner