PowerPress Posts From MySQL addon Security & Risk Analysis

wordpress.org/plugins/powerpress-posts-from-mysql

Have a bunch of podcasts stored on your server and aren't excited about creating each post manually? This can help.

10 active installs v0.9.10 PHP + WP 3.0+ Updated Jun 14, 2016
mysqlpodcastpodcastingpowerpresssql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PowerPress Posts From MySQL addon Safe to Use in 2026?

Generally Safe

Score 85/100

PowerPress Posts From MySQL addon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

Based on the static analysis, the 'powerpress-posts-from-mysql' plugin version 0.9.10 exhibits a generally positive security posture. The absence of any identified CVEs in its history suggests a history of responsible development or minimal public exposure to vulnerabilities. The code analysis reveals a notable lack of critical vulnerabilities such as dangerous functions or SQL injection risks, with all SQL queries using prepared statements. Taint analysis also indicates no critical or high severity unsanitized flows, which is a strong indicator of secure code practices for data handling.

However, there are areas that warrant attention. The output escaping is significantly lacking, with only 10% of outputs properly escaped. This leaves the plugin susceptible to cross-site scripting (XSS) vulnerabilities if any of the unescaped outputs are rendered in a user-facing context and contain malicious input. While the attack surface appears to be zero in terms of exposed entry points (AJAX, REST API, shortcodes, cron events), this is based solely on the provided analysis and could potentially change with future updates or if the plugin relies on other mechanisms for user interaction not captured here. The presence of file operations without further context also raises a mild flag, though without additional information, it's difficult to assess the specific risk.

In conclusion, the plugin demonstrates good practices regarding SQL security and has a clean vulnerability history. The primary weakness identified is the poor output escaping, which presents a clear risk of XSS. The lack of critical issues in taint analysis and the absence of known CVEs are significant strengths. However, the low percentage of properly escaped output should be addressed to mitigate potential XSS risks.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

PowerPress Posts From MySQL addon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

PowerPress Posts From MySQL addon Release Timeline

v0.9.75
v0.9.10Current
v0.9.9a
v0.9.4
v0.9.2
v0.9.2a
v0.9.1
v0.9
Code Analysis
Analyzed Apr 16, 2026

PowerPress Posts From MySQL addon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
27
3 escaped
Nonce Checks
6
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

10% escaped30 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
ppfm_podcasts_page (powerpress-posts-from-mysql.php:168)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PowerPress Posts From MySQL addon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menupowerpress-posts-from-mysql.php:80
actionadmin_headpowerpress-posts-from-mysql.php:82
actionadmin_initpowerpress-posts-from-mysql.php:83
actionadmin_initpowerpress-posts-from-mysql.php:84
filterset-screen-optionpowerpress-posts-from-mysql.php:85
Maintenance & Trust

PowerPress Posts From MySQL addon Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJun 14, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

PowerPress Posts From MySQL addon Developer Profile

machouinard

3 plugins · 110 total installs

78
trust score
Avg Security Score
77/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PowerPress Posts From MySQL addon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/powerpress-posts-from-mysql/css/ppfm.css/wp-content/plugins/powerpress-posts-from-mysql/js/ppfm.js
Script Paths
/wp-content/plugins/powerpress-posts-from-mysql/js/ppfm.js
Version Parameters
powerpress-posts-from-mysql/css/ppfm.css?ver=powerpress-posts-from-mysql/js/ppfm.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-list-tablecolumn-cbcolumn-postedcolumn-title
Data Attributes
data-id
JS Globals
ppfm_var
FAQ

Frequently Asked Questions about PowerPress Posts From MySQL addon