
SitePush Security & Risk Analysis
wordpress.org/plugins/sitepushEasily move content and code between WordPress sites. Pull your site's DB to a dev site, push new code to a staging site, etc.
Is SitePush Safe to Use in 2026?
Generally Safe
Score 85/100SitePush has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'sitepush' plugin version 0.4.2 exhibits a mixed security posture. On the positive side, there are no known vulnerabilities (CVEs) associated with this plugin, and the static analysis shows a strong emphasis on security best practices, with a high percentage of SQL queries using prepared statements and a significant number of capability checks in place. The limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events lacking authentication, is also a positive indicator.
However, several concerning signals emerge from the code analysis. The presence of dangerous functions like `shell_exec`, `popen`, and `exec` is a significant red flag, as these can be exploited for remote code execution if not handled with extreme care and proper sanitization. Furthermore, the low percentage of properly escaped output (3%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, where untrusted data displayed to users could be manipulated to execute malicious scripts.
The taint analysis reveals two flows with unsanitized paths. While these are not classified as critical or high severity, they still represent potential security weaknesses that could be exploited. The absence of any recorded vulnerabilities in the plugin's history is reassuring, but it does not negate the risks identified in the static and taint analyses. The plugin appears to have strengths in its overall structure and adherence to some security best practices, but the use of dangerous functions and inadequate output escaping present clear and present dangers that require immediate attention.
Key Concerns
- Dangerous functions (shell_exec, popen, exec) detected
- Low percentage of properly escaped output
- Unsanitized paths found in taint analysis
SitePush Security Vulnerabilities
SitePush Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
SitePush Attack Surface
WordPress Hooks 12
Maintenance & Trust
SitePush Maintenance & Trust
Maintenance Signals
Community Trust
SitePush Alternatives
Migrate to WordPress.com
wpcom-migration
A WordPress plugin that helps users to migrate their sites to WordPress.com
Transferito: WP Migration
transferito
The easiest 1-Click WordPress Migration plugin that will migrate, clone, transfer and move your WordPress site to any host in seconds.
All-in-One WP Migration and Backup
all-in-one-wp-migration
Trusted by 60M+ sites: The gold standard for WordPress migration and backup. Migrate, backup, and restore your WordPress site with one click.
Migrate Guru – Site Migration & Cloning
migrate-guru
Effortlessly migrate, clone, or transfer your WordPress site to over 5,000 web hosts with Migrate Guru, trusted by Cloudways, Pantheon, and Dreamhost.
Backup Migration
backup-backup
Backup Migration
SitePush Developer Profile
1 plugin · 30 total installs
How We Detect SitePush
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/sitepush/assets/css/sitepush.css/wp-content/plugins/sitepush/assets/js/sitepush.jssitepush/assets/css/sitepush.css?ver=sitepush/assets/js/sitepush.js?ver=HTML / DOM Fingerprints
sitepush-settings<!-- SitePush: Copyright 2009-2012 Mark Rowatt Anderson (http://rowatt.com) --><!-- SitePush: This program is free software; you can redistribute it and/or modify<!-- SitePush: This program is distributed in the hope that it will be useful,<!-- SitePush: You should have received a copy of the GNU General Public License+2 moredata-sp-sitepush-keysitepush_vars