Post to PDF Exporter Security & Risk Analysis

wordpress.org/plugins/post-to-pdf-exporter

Convert WordPress posts to downloadable PDFs with custom settings, including watermark and more.

40 active installs v1.0 PHP 7.4+ WP 6.0+ Updated Unknown
convert-to-pdfexport-pdfpdfpost-to-pdfwordpress-pdf
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Post to PDF Exporter Safe to Use in 2026?

Generally Safe

Score 100/100

Post to PDF Exporter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "post-to-pdf-exporter" plugin v1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points, coupled with the complete lack of dangerous functions and raw SQL queries, indicates a well-secured codebase. Furthermore, the high percentage of properly escaped output and the presence of a nonce check suggest good development practices to mitigate common web vulnerabilities. The vulnerability history also shows no previously recorded CVEs, which is a positive indicator of past security diligence.

However, a notable concern is the lack of capability checks. While there are no apparent entry points *requiring* authentication or authorization checks that were missed, the absence of capability checks altogether means that if any new entry points were to be introduced in future versions without proper checks, they could be vulnerable. The bundling of the dompdf library also warrants attention, as outdated or vulnerable versions of bundled libraries can introduce significant risks, though no specific issues were flagged in the analysis.

In conclusion, the plugin appears to be securely developed with a minimal attack surface and good mitigation techniques. The primary area for improvement and potential future risk lies in the complete absence of capability checks, which, while not an immediate flaw given the current analysis, represents a missed opportunity for robust access control and a potential blind spot for future development.

Key Concerns

  • Missing capability checks on entry points
  • Bundled outdated library (dompdf)
Vulnerabilities
None known

Post to PDF Exporter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post to PDF Exporter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
29 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

dompdf

Output Escaping

91% escaped32 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<generate-pdf> (inc\generate-pdf.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Post to PDF Exporter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menupost-to-pdf-exporter.php:36
actionadmin_initpost-to-pdf-exporter.php:42
actionadmin_post_generate_pdf_sunarcpost-to-pdf-exporter.php:113
actionadmin_post_nopriv_generate_pdf_sunarcpost-to-pdf-exporter.php:114
filterthe_contentpost-to-pdf-exporter.php:155
Maintenance & Trust

Post to PDF Exporter Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.4
Downloads655

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Post to PDF Exporter Developer Profile

SunCart

13 plugins · 510 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post to PDF Exporter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-to-pdf-exporter/assets/image/pdf.png

HTML / DOM Fingerprints

CSS Classes
watermark
FAQ

Frequently Asked Questions about Post to PDF Exporter