Post via Dropbox Security & Risk Analysis

wordpress.org/plugins/post-via-dropbox

Post via Dropbox allows you to post or edit your blog with text files uploaded via Dropbox. It just works seamlessly without any effort.

10 active installs v2.20 PHP + WP 3.0.0+ Updated May 10, 2018
dropboxpostpost-via-dropboxpostingremote-update
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post via Dropbox Safe to Use in 2026?

Generally Safe

Score 85/100

Post via Dropbox has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "post-via-dropbox" v2.20 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and appears to have no recorded historical vulnerabilities. The absence of known CVEs and a clean vulnerability history are significant strengths, suggesting a generally well-maintained codebase. However, the static analysis reveals several concerning areas. The presence of dangerous functions like `unserialize` and `create_function` is a red flag, as these can be exploited if user-supplied data is not rigorously sanitized before being passed to them. Furthermore, a very low percentage (18%) of output escaping is a critical weakness, exposing the plugin to potential Cross-Site Scripting (XSS) vulnerabilities where improperly escaped data could be rendered in the user's browser. The lack of nonce and capability checks on any potential entry points (though the attack surface is reported as zero without auth checks) is also a significant concern, as it implies that any functionality exposed could be triggered by unauthenticated users or users with insufficient privileges if new entry points were inadvertently added or exploited.

While the plugin's direct attack surface is reported as zero without authentication checks, the identified code signals raise serious concerns. The use of `unserialize` and `create_function` without clear indications of robust input validation is a major risk. If any user-controlled input is ever deserialized or passed to `create_function`, it could lead to arbitrary code execution. The low output escaping rate is a direct indicator of XSS vulnerabilities. Even with a limited attack surface, the potential for XSS remains high when data is not properly escaped before output. The vulnerability history, while clean, doesn't negate the inherent risks within the current codebase. The absence of historical vulnerabilities could simply mean no exploits have been discovered or reported yet, rather than an inherent immunity. Therefore, despite a clean history, the plugin requires immediate attention due to the identified dangerous functions and critical output escaping deficiencies.

Key Concerns

  • Dangerous functions used (unserialize, create_function)
  • Low output escaping percentage (18%)
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

Post via Dropbox Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post via Dropbox Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
2 prepared
Unescaped Output
18
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
9
External Requests
1
Bundled Libraries
1

Dangerous Functions Found

unserializereturn @unserialize($token);dropbox\Session.php:133
create_function$this->utf8_strlen = create_function('$text', 'return preg_match_all(Michelf\Markdown.php:1495

Bundled Libraries

Guzzle

SQL Query Safety

100% prepared2 total queries

Output Escaping

18% escaped22 total outputs
Attack Surface

Post via Dropbox Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionupdate_option_active_pluginspvd.php:53
actionadmin_menupvd.php:91
actionadmin_initpvd.php:101
actionadmin_initpvd.php:155
filtercron_schedulespvd.php:157
actionpvd_cronpvd.php:159
actionadmin_noticespvd.php:166

Scheduled Events 1

pvd_cron
Maintenance & Trust

Post via Dropbox Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 10, 2018
PHP min version
Downloads7K

Community Trust

Rating96/100
Number of ratings5
Active installs10
Developer Profile

Post via Dropbox Developer Profile

PaoloBe

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post via Dropbox

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-via-dropbox/post-via-dropbox.css/wp-content/plugins/post-via-dropbox/css/style.css/wp-content/plugins/post-via-dropbox/js/post-via-dropbox.js/wp-content/plugins/post-via-dropbox/js/script.js
Script Paths
/wp-content/plugins/post-via-dropbox/js/post-via-dropbox.js/wp-content/plugins/post-via-dropbox/js/script.js
Version Parameters
post-via-dropbox.css?ver=style.css?ver=post-via-dropbox.js?ver=script.js?ver=

HTML / DOM Fingerprints

CSS Classes
pvd-settings-sectionpvd-labelpvd-inputpvd-options-grouppvd-submit-button
HTML Comments
<!-- wp:paragraph --><!-- /wp:paragraph --><!-- Post via Dropbox settings --><!-- End Post via Dropbox settings -->
Data Attributes
data-pvd-setting-keydata-pvd-input-typepvd-save-button
JS Globals
window.pvd_ajax_objectvar pvd_options_page
REST Endpoints
/wp-json/pvd/v1/settings/wp-json/pvd/v1/status
Shortcode Output
[post_via_dropbox_form][post_via_dropbox_list]
FAQ

Frequently Asked Questions about Post via Dropbox