
PushPull Security & Risk Analysis
wordpress.org/plugins/pushpullGit-based content sync for WordPress. Project homepage: https://creativemoods.pt/pushpull/
Is PushPull Safe to Use in 2026?
Generally Safe
Score 100/100PushPull has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'pushpull' plugin v0.0.20 presents a mixed security posture. On the positive side, it demonstrates excellent adherence to secure coding practices by utilizing prepared statements for all SQL queries and ensuring 100% of its outputs are properly escaped. The plugin also incorporates a substantial number of nonce and capability checks, indicating an awareness of WordPress security best practices for authenticated actions.
However, significant concerns arise from the identified attack surface. The plugin exposes two AJAX handlers, and critically, both of these lack any authentication checks. This creates a direct pathway for unauthenticated users to interact with plugin functionality, potentially leading to unintended consequences or exploitation of underlying vulnerabilities. While the static analysis and taint analysis found no immediate critical or high severity issues related to data sanitization or dangerous function usage (like unserialize), the unprotected entry points remain a significant risk.
Furthermore, the complete absence of known vulnerabilities in its history is a positive indicator, suggesting a well-maintained codebase or limited exposure. Nevertheless, this does not negate the inherent risk posed by the unprotected AJAX endpoints. In conclusion, while the plugin excels in areas like SQL prepared statements and output escaping, the unauthenticated AJAX handlers represent a glaring security weakness that requires immediate attention. The overall risk is moderate, heavily influenced by the potential for exploitation of these unprotected entry points.
Key Concerns
- Unprotected AJAX handlers
- Dangerous function 'unserialize' used
PushPull Security Vulnerabilities
PushPull Release Timeline
PushPull Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
PushPull Attack Surface
AJAX Handlers 2
WordPress Hooks 31
Maintenance & Trust
PushPull Maintenance & Trust
Maintenance Signals
Community Trust
PushPull Alternatives
Github Embed
github-embed
Plugin that allows you to embed details from GitHub just by pasting in the URL as you would any other embed source. Currently supports:
Static Site Exporter
jekyll-exporter
Features
Pastacode
pastacode
Use Pastacode to add code into your posts with the awesome PrismJs coloration library. So, past'a code!
WP Plugin Info Card
wp-plugin-info-card
Add beautiful, customizable cards to showcase plugins, themes, and projects from WordPress.org, GitHub, EDD, and third-party plugins.
Embed Block for GitHub
embed-block-for-github
Easily embed GitHub repositories in Gutenberg Editor.
PushPull Developer Profile
1 plugin · 0 total installs
How We Detect PushPull
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pushpull/plugin-assets/css/admin.csspushpull/plugin-assets/css/admin.css?ver=HTML / DOM Fingerprints
pushpull-adminpushpull-intropushpull-domain-source-gridname="action"value="pushpull_save_domains"name="_wpnonce"name="_wp_http_referer"