Shift8 Push Security & Risk Analysis

wordpress.org/plugins/shift8-push

This is a plugin that pushes a single post or page to an external site via the REST API

0 active installs v1.0.2 PHP + WP 3.0.1+ Updated Unknown
contentproductionpushstaging
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Shift8 Push Safe to Use in 2026?

Generally Safe

Score 100/100

Shift8 Push has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'shift8-push' plugin version 1.0.2 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by using prepared statements for all SQL queries and has a clean vulnerability history with no recorded CVEs. It also has a reasonable number of output escaping implementations, though not all are properly escaped. However, there are several areas of concern that warrant attention.

The static analysis reveals an unprotected REST API route, which represents a direct attack vector. The presence of the `unserialize` function is a significant risk, as it can lead to remote code execution if user-supplied data is processed without proper sanitization, even though the taint analysis did not reveal immediate critical or high severity flows. Furthermore, the plugin makes external HTTP requests, which could be exploited if not handled securely. The number of entry points is relatively low, but the presence of an unprotected entry point is a notable weakness.

Overall, while the plugin has a strong track record and uses some secure coding practices, the unprotected REST API route and the use of `unserialize` introduce significant risks. The lack of recorded vulnerabilities could be due to its limited usage or the effectiveness of its existing security measures against discovered threats. However, these identified risks, if exploited, could lead to serious security breaches, making it crucial for users to be aware of and mitigate these potential vulnerabilities.

Key Concerns

  • REST API route without permission callbacks
  • Use of dangerous function: unserialize
  • Outputs not properly escaped (30%)
  • External HTTP requests present
Vulnerabilities
None known

Shift8 Push Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Shift8 Push Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
2 prepared
Unescaped Output
18
42 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
6
Bundled Libraries
0

Dangerous Functions Found

unserializeif ( is_string( $data ) && ( $unserialized = @unserialize( $data ) ) !== false ) {components\functions.php:416

SQL Query Safety

100% prepared2 total queries

Output Escaping

70% escaped60 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
shift8_push_push (components\functions.php:50)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Shift8 Push Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_shift8_push_pushcomponents\functions.php:49

REST API Routes 1

POST/wp-json/shift8/v1/meta/components\functions.php:364
WordPress Hooks 9
actionadmin_enqueue_scriptscomponents\enqueuing.php:24
actionrest_api_initcomponents\functions.php:312
actionrest_api_initcomponents\functions.php:363
actionadmin_headcomponents\settings.php:13
actionadmin_menucomponents\settings.php:27
actionadmin_initcomponents\settings.php:35
actioninitcomponents\settings.php:104
filterpre_update_option_shift8_push_application_passwordcomponents\settings.php:106
actionpost_submitbox_misc_actionscomponents\settings.php:118
Maintenance & Trust

Shift8 Push Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedUnknown
PHP min version
Downloads787

Community Trust

Rating20/100
Number of ratings1
Active installs0
Developer Profile

Shift8 Push Developer Profile

shift8

11 plugins · 980 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Shift8 Push

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shift8-push/css/shift8-push-admin-style.css/wp-content/plugins/shift8-push/css/shift8-push-style.css/wp-content/plugins/shift8-push/js/shift8-push-admin-script.js/wp-content/plugins/shift8-push/js/shift8-push-script.js
Script Paths
/wp-content/plugins/shift8-push/js/shift8-push-admin-script.js/wp-content/plugins/shift8-push/js/shift8-push-script.js
Version Parameters
shift8-push/css/shift8-push-admin-style.css?ver=shift8-push/css/shift8-push-style.css?ver=shift8-push/js/shift8-push-admin-script.js?ver=shift8-push/js/shift8-push-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
shift8-push-tableshift8-push-admin-tab-activeshift8-push-admin-tab-inactiveshift8-push-tooltipshift8-push-tooltiptextshift8-push-spinnershift8-push-prereg-noteshift8-push-controls+5 more
HTML Comments
<!-- Composer dependencies --><!-- Admin welcome page --><!-- Admin settings page --><!-- SUPPORT TAB -->
Data Attributes
shift8_push_src_urlshift8_push_dst_urlshift8_push_application_usershift8_push_application_passwordshift8_push_enabled
JS Globals
Shift8PushCopyToClipboard
REST Endpoints
/wp-json/shift8-push/v1/push/wp-json/shift8-push/v1/pull
FAQ

Frequently Asked Questions about Shift8 Push