Post Replicator Security & Risk Analysis

wordpress.org/plugins/post-replicator

Replicate posts to multiple websites, this are replicated on base of the allowed categories

10 active installs v0.1.0 PHP 7.4+ WP + Updated Aug 4, 2023
duplicationpostreplication
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Post Replicator Safe to Use in 2026?

Generally Safe

Score 85/100

Post Replicator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'post-replicator' plugin v0.1.0 demonstrates a generally good security posture with several strong practices. The static analysis reveals a very low attack surface, with no apparent unprotected AJAX handlers, REST API routes, or shortcodes. The overwhelming majority of SQL queries utilize prepared statements, and output escaping is also exceptionally high, suggesting developers have a good understanding of common web vulnerabilities. The absence of known CVEs and any recorded vulnerability history further contributes to this positive impression.

However, a significant concern is the presence of the `unserialize` function, which can be a major security risk if used with untrusted input. While the static analysis and taint flows did not reveal any immediate exploitable instances of this function, its mere presence without robust input validation or sanitization represents a potential vulnerability. Furthermore, the complete lack of nonce checks is a notable omission, especially for a plugin that might handle data modifications. The capability checks are present, but without knowing what actions they protect, it's difficult to fully assess their effectiveness. Overall, the plugin has a solid foundation, but the `unserialize` function and the absence of nonce checks introduce a degree of risk that requires careful consideration.

Key Concerns

  • Use of unserialize function
  • Missing nonce checks
Vulnerabilities
None known

Post Replicator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Replicator Code Analysis

Dangerous Functions
2
Raw SQL Queries
3
22 prepared
Unescaped Output
2
51 escaped
Nonce Checks
0
Capability Checks
4
File Operations
1
External Requests
8
Bundled Libraries
0

Dangerous Functions Found

unserialize$cats_config = unserialize($website->categories_config);src\Admin.php:46
unserialize$this->categories_config = unserialize($website->categories_config);src\Connector.php:47

SQL Query Safety

88% prepared25 total queries

Output Escaping

96% escaped53 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
process_requests (src\Route.php:8)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post Replicator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menusrc\App.php:15
actionadmin_initsrc\App.php:16
actionsave_postsrc\App.php:18
Maintenance & Trust

Post Replicator Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 4, 2023
PHP min version7.4
Downloads757

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Replicator Developer Profile

aixeiger

5 plugins · 140 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Replicator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
post-replicator/style.css?ver=post-replicator/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Post Replicator