SF Archiver Security & Risk Analysis

wordpress.org/plugins/sf-archiver

Add some small and useful utilities for managing your Custom Post Types archives.

10 active installs v3.0.2 PHP + WP 4.4+ Updated Apr 3, 2016
archivecontentpost-types
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SF Archiver Safe to Use in 2026?

Generally Safe

Score 85/100

SF Archiver has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "sf-archiver" plugin version 3.0.2 exhibits a generally positive security posture based on the provided static analysis. It boasts a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, zero unprotected entry points. The code also demonstrates good practices in output escaping, with a majority of outputs being properly handled. However, a significant concern arises from the presence of the `unserialize` function, which, in conjunction with other potential weaknesses, can lead to severe security vulnerabilities if not handled with extreme care and user input sanitization.

The absence of any recorded CVEs or past vulnerabilities is a strong indicator of responsible development or simply a lack of prior discovery. This, combined with the minimal attack surface, suggests that the plugin is likely well-maintained and has not been a target for known exploits. Despite the positive aspects, the single "dangerous function" (`unserialize`) is a critical signal that warrants careful consideration. Without more context on how this function is used and what data it processes, it's impossible to definitively assess its risk, but its mere presence represents a potential point of failure.

In conclusion, "sf-archiver" v3.0.2 appears to have a solid foundation with its limited attack surface and good output escaping. The lack of historical vulnerabilities is reassuring. The primary weakness identified is the use of `unserialize`. While the taint analysis shows no current unsanitized flows, the potential for such flows exists with the `unserialize` function, making it the most significant area of concern for this version.

Key Concerns

  • Dangerous function unserialize found
  • SQL queries not using prepared statements
  • No nonce checks
  • No capability checks
  • Output escaping not 100%
Vulnerabilities
None known

SF Archiver Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SF Archiver Code Analysis

Dangerous Functions
1
Raw SQL Queries
3
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$meta->meta_value = unserialize( $meta->meta_value );inc\migrate.php:44

SQL Query Safety

0% prepared3 total queries

Output Escaping

67% escaped6 total outputs
Attack Surface

SF Archiver Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitinc\admin.php:10
actionadmin_footer-edit.phpinc\admin.php:24
actionplugins_loadedinc\admin.php:47
actionload-options-reading.phpinc\admin.php:66
filterwp_get_nav_menu_itemsinc\frontend.php:12
filternav_menu_css_classinc\frontend.php:30
actionpre_get_postsinc\frontend.php:61
actionplugins_loadedsf-archiver.php:38
Maintenance & Trust

SF Archiver Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedApr 3, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

SF Archiver Developer Profile

Grégory Viguier

5 plugins · 7K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SF Archiver

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about SF Archiver