Post Porter Security & Risk Analysis

wordpress.org/plugins/post-porter

Post Porter enables seamless posts migration between WordPress sites via REST API, ensuring alignment with standard post principles.

20 active installs v1.0.1 PHP 7.0+ WP 6.2+ Updated Jun 12, 2025
apiimport-export-custom-post-typeimport-exportrestapi
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Porter Safe to Use in 2026?

Generally Safe

Score 100/100

Post Porter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The 'post-porter' plugin version 1.0.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, exclusively using prepared statements, and a high percentage of output escaping, suggesting an awareness of common web vulnerabilities. The absence of known CVEs and critical taint flows further indicates a relatively clean history and code.

However, significant concerns arise from the attack surface analysis. The plugin exposes one REST API route without any permission callbacks, creating a potential entry point for unauthorized actions. While there are no direct indications of malicious code or unpatched vulnerabilities, this unprotected endpoint represents a clear risk. The limited taint analysis showing no unsanitized paths is reassuring, but the lack of capability checks on this specific API route is a critical oversight.

In conclusion, 'post-porter' v1.0.1 benefits from secure SQL handling and good output escaping. Nevertheless, the single, unprotected REST API route is a notable weakness that could be exploited. It is recommended to address this by implementing appropriate permission checks on the exposed REST API endpoint to fully secure the plugin.

Key Concerns

  • Unprotected REST API route
Vulnerabilities
None known

Post Porter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Post Porter Release Timeline

v1.0.1Current
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Post Porter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
11 prepared
Unescaped Output
13
59 escaped
Nonce Checks
9
Capability Checks
0
File Operations
0
External Requests
11
Bundled Libraries
0

SQL Query Safety

100% prepared11 total queries

Output Escaping

82% escaped72 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

1 flows
<post-porter-import-settings> (backend\methods\post-porter-import-settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Post Porter Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/wp/v1post-importerbackend\includes\post-porter-back-end-custom-functions.php:99
WordPress Hooks 6
actionadmin_menubackend\includes\post-porter-back-end-custom-functions.php:52
actionrest_api_initbackend\includes\post-porter-back-end-custom-functions.php:92
actioninitbackend\methods\post-porter-import-function.php:50
filtercron_schedulesbackend\wp-background-processing-master\classes\wp-background-process.php:76
actioninitpost-porter.php:48
actionadmin_enqueue_scriptspost-porter.php:56
Maintenance & Trust

Post Porter Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 12, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings4
Active installs20
Developer Profile

Post Porter Developer Profile

Weboccult Technologies Pvt Ltd

8 plugins · 550 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Porter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-porter/backend/assets/public-style.css

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wp/v1/post-importer
FAQ

Frequently Asked Questions about Post Porter