post2Qzone Security & Risk Analysis

wordpress.org/plugins/post2qzone

post2Qzone

10 active installs v1.2.2 PHP + WP 2.0.2+ Updated Jan 19, 2013
post2qzoneqqqq%e7%a9%ba%e9%97%b4qzone
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is post2Qzone Safe to Use in 2026?

Generally Safe

Score 85/100

post2Qzone has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "post2qzone" plugin version 1.2.2 exhibits a mixed security posture. On the positive side, it has a remarkably small attack surface, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed. Furthermore, all SQL queries are commendably performed using prepared statements, and there are no recorded vulnerabilities (CVEs) in its history. This suggests a generally cautious approach to critical areas like database interaction and known exploits. However, a significant concern arises from the complete lack of output escaping. With 28 total outputs and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user without proper sanitization can be exploited by attackers to inject malicious scripts. While the plugin demonstrates good practices in preventing direct code execution vulnerabilities and database injection, the absence of output escaping is a major oversight that significantly elevates the risk profile, particularly for user-facing content.

Key Concerns

  • No output escaping
Vulnerabilities
None known

post2Qzone Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

post2Qzone Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped28 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
post2Qzone_options (post2qzone.php:90)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

post2Qzone Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitpost2qzone.php:76
actionadmin_menupost2qzone.php:79
actionpublish_postpost2qzone.php:165
Maintenance & Trust

post2Qzone Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.0
Last updatedJan 19, 2013
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

post2Qzone Developer Profile

Guoliang

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect post2Qzone

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="post2QZone_qq"name="post2QZone_pw"name="post2QZone_bcc"name="post2QZone_catsRules"name="post2QZone_title_prefix"name="post2QZone_plain"+3 more
FAQ

Frequently Asked Questions about post2Qzone