Remote site posts For Elementor Security & Risk Analysis

wordpress.org/plugins/remote-site-posts-for-elementor

Display remote site posts in the Elementor page builder

10 active installs v0.1.0 PHP + WP 4.5+ Updated Dec 8, 2019
fetchpostpostsremoterest
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Remote site posts For Elementor Safe to Use in 2026?

Generally Safe

Score 85/100

Remote site posts For Elementor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The plugin "remote-site-posts-for-elementor" v0.1.0 exhibits a generally good security posture based on the static analysis. It demonstrates a lack of common attack surface vectors such as AJAX handlers, REST API routes, shortcodes, and cron events, with zero entry points and therefore zero unprotected entry points. The code also shows positive signs like the absence of dangerous functions and file operations, and SQL queries are exclusively handled using prepared statements. However, the analysis does reveal a single external HTTP request, which is a potential area for concern if not handled securely, and a concerningly low 80% of output is properly escaped, leaving room for potential cross-site scripting vulnerabilities. Furthermore, the complete absence of nonce and capability checks across all entry points is a significant weakness. The vulnerability history is clean, with no known CVEs, which suggests a responsible development approach or simply a lack of prior exposure to significant security issues. Despite the clean history and good practices in some areas, the lack of crucial security checks and the incomplete output escaping introduce notable risks that need attention.

Key Concerns

  • Unescaped output (20% of outputs)
  • External HTTP request
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Remote site posts For Elementor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Remote site posts For Elementor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

80% escaped10 total outputs
Attack Surface

Remote site posts For Elementor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitremote-site-posts-for-elementor.php:96
actionplugins_loadedremote-site-posts-for-elementor.php:97
actionadmin_noticesremote-site-posts-for-elementor.php:135
actionadmin_noticesremote-site-posts-for-elementor.php:141
actionadmin_noticesremote-site-posts-for-elementor.php:147
actionelementor/widgets/widgets_registeredremote-site-posts-for-elementor.php:152
Maintenance & Trust

Remote site posts For Elementor Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedDec 8, 2019
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Remote site posts For Elementor Developer Profile

Prashant Baldha

7 plugins · 970 total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
558 days
View full developer profile
Detection Fingerprints

How We Detect Remote site posts For Elementor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Remote site posts For Elementor