Posterous Importer Security & Risk Analysis

wordpress.org/plugins/posterous-importer

Import posts, comments, tags, and attachments from a Posterous.com blog.

90 active installs v0.10 PHP + WP 2.9+ Updated Mar 1, 2013
importerposterouswordpress-com
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Posterous Importer Safe to Use in 2026?

Generally Safe

Score 85/100

Posterous Importer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'posterous-importer' plugin v0.10 exhibits a mixed security posture. On one hand, the complete absence of known CVEs and the use of prepared statements for all SQL queries are positive indicators. However, the static analysis reveals significant areas of concern. The low percentage of properly escaped outputs (43%) suggests a high risk of cross-site scripting (XSS) vulnerabilities. Furthermore, the taint analysis identified two flows with unsanitized paths, which could lead to path traversal or arbitrary file access vulnerabilities, even though they were not classified as critical. The complete lack of nonce checks and capability checks, especially given the presence of file operations, is a substantial weakness, as it leaves entry points vulnerable to unauthorized actions.

Key Concerns

  • Low percentage of properly escaped output
  • Unsanitized paths in taint analysis (2 flows)
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Posterous Importer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Posterous Importer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
12
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

43% escaped21 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
step_1 (posterous.php:869)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Posterous Importer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionprocess_attachmentposterous.php:54
actionposterous_handle_bad_responseposterous.php:55
actionadmin_enqueue_scriptsposterous.php:58
actionadmin_headposterous.php:59
filterhttp_request_timeoutposterous.php:513
Maintenance & Trust

Posterous Importer Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMar 1, 2013
PHP min version
Downloads16K

Community Trust

Rating90/100
Number of ratings2
Active installs90
Developer Profile

Posterous Importer Developer Profile

briancolinger

11 plugins · 113K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Posterous Importer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Posterous Importer