PushLive – Staging Sites to Live in One Click Security & Risk Analysis

wordpress.org/plugins/pushlive

Allows you to have a fully functioning development Staging Site or Multisite that you can individually Push to Live when ready.

20 active installs v0.6.8 PHP + WP 4+ Updated Nov 8, 2015
1-squaredpushlivestagestagingstaging-site
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PushLive – Staging Sites to Live in One Click Safe to Use in 2026?

Generally Safe

Score 85/100

PushLive – Staging Sites to Live in One Click has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "pushlive" plugin v0.6.8 exhibits a concerning security posture primarily due to a significant lack of proper authentication and authorization checks on its entry points. The static analysis reveals three AJAX handlers, all of which are completely unprotected, presenting a substantial attack surface. This means any unauthenticated user could potentially trigger these functions. Furthermore, the presence of the 'exec' function is a critical red flag, as it allows for arbitrary command execution if not handled with extreme care and robust input validation, which appears to be lacking. The absence of proper output escaping on all identified outputs exacerbates the risk, making cross-site scripting (XSS) attacks highly probable.

Compounding these issues, the plugin does not implement any nonce checks for its AJAX handlers, which is a standard WordPress security practice to prevent cross-site request forgery (CSRF) attacks. While there are no recorded vulnerabilities in its history, this can be misleading. The lack of detected vulnerabilities might be due to the absence of sophisticated dynamic analysis or widespread testing, rather than an inherent secure coding practice. The plugin's strengths are minimal in terms of security, with no readily apparent positive security signals beyond the existence of some capability checks. The overall picture is one of a plugin with a high potential for exploitation due to a lack of fundamental security controls.

Key Concerns

  • Unprotected AJAX handlers
  • Use of 'exec' function
  • Missing nonce checks on AJAX
  • No output escaping
  • SQL queries without prepared statements
Vulnerabilities
None known

PushLive – Staging Sites to Live in One Click Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PushLive – Staging Sites to Live in One Click Code Analysis

Dangerous Functions
4
Raw SQL Queries
4
2 prepared
Unescaped Output
43
0 escaped
Nonce Checks
0
Capability Checks
4
File Operations
4
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

exec$result = exec($cmd, $output, $return);includes\class.pushlive-dbsync.php:275
exec$result = exec($cmd, $output, $return);includes\class.pushlive-dbsync.php:288
exec$result = exec($cmd, $output, $return);includes\class.pushlive-dbsync.php:311
execexec( $cmd, $output, $return );includes\class.pushlive-rsync.php:40

SQL Query Safety

33% prepared6 total queries

Output Escaping

0% escaped43 total outputs
Attack Surface
3 unprotected

PushLive – Staging Sites to Live in One Click Attack Surface

Entry Points3
Unprotected3

AJAX Handlers 3

authwp_ajax_test_databasesettings\admin-settings.php:6
authwp_ajax_test_replicate_databasesettings\replicate-settings.php:6
authwp_ajax_begin_replicationsettings\replicate-settings.php:8
WordPress Hooks 9
actionadmin_menuclass.pushlive-admin.php:17
actionnetwork_admin_menuclass.pushlive-admin.php:18
actionparse_requestpushlive.php:26
actioninitpushlive.php:71
actionadmin_initpushlive.php:79
actionadmin_initpushlive.php:83
actionadmin_footersettings\admin-settings.php:176
actionadmin_footersettings\replicate-settings.php:7
actionadmin_footersettings\replicate-settings.php:9
Maintenance & Trust

PushLive – Staging Sites to Live in One Click Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 8, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings3
Active installs20
Developer Profile

PushLive – Staging Sites to Live in One Click Developer Profile

Jamin Szczesny

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PushLive – Staging Sites to Live in One Click

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pushlive/includes/admin.css

HTML / DOM Fingerprints

JS Globals
PUSHLIVE__INCLUDES_URLPUSHLIVE__PLUGIN_DIR
FAQ

Frequently Asked Questions about PushLive – Staging Sites to Live in One Click