SoldSteps Demo Import Security & Risk Analysis

wordpress.org/plugins/soldsteps-demo-import

Provides an easy way to import demo content for WordPress themes.

0 active installs v1.0.0 PHP 7.2+ WP 5.0+ Updated Feb 18, 2026
demo-importone-click-demo-importstarter-contenttheme-demo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SoldSteps Demo Import Safe to Use in 2026?

Generally Safe

Score 100/100

SoldSteps Demo Import has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'soldsteps-demo-import' plugin, in version 1.0.0, exhibits a generally positive security posture from a static analysis perspective. The absence of any discovered AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength, indicating a limited attack surface that is, for the most part, secured. The plugin also demonstrates good practices by using prepared statements for all SQL queries and incorporating nonce and capability checks where applicable.

However, the analysis reveals a critical weakness in output escaping, with 0% of the four identified outputs being properly escaped. This presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities, as unsanitized data displayed to users could be manipulated by an attacker. Additionally, the presence of a file operation without further context is a potential concern, although its severity is unknown without more information. The plugin's vulnerability history is clean, with no recorded CVEs, which is reassuring. Despite the clean history, the unescaped output is a tangible, immediate risk that needs addressing.

In conclusion, while 'soldsteps-demo-import' v1.0.0 benefits from a small attack surface and secure SQL handling, the complete lack of output escaping is a serious oversight that significantly undermines its security. The absence of known vulnerabilities is a positive sign, but it does not mitigate the inherent risks introduced by the unescaped output.

Key Concerns

  • Unescaped output (4 total, 0% escaped)
  • File operation detected
Vulnerabilities
None known

SoldSteps Demo Import Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SoldSteps Demo Import Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

SoldSteps Demo Import Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_noticessoldsteps-demo-import.php:36
actionadmin_menusoldsteps-demo-import.php:57
Maintenance & Trust

SoldSteps Demo Import Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 18, 2026
PHP min version7.2
Downloads167

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SoldSteps Demo Import Developer Profile

Ashraf Ali

2 plugins · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SoldSteps Demo Import

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/soldsteps-demo-import/demo/home.json

HTML / DOM Fingerprints

CSS Classes
notice-successnotice-info
HTML Comments
STEP 1: Import home.json as Elementor templateSTEP 2: Create Home page + apply templateSTEP 3: Create Menu WITH Home pageHelper: Get post by title (WP 6.2+ safe)+3 more
Data Attributes
name="soldsteps_import_demo"
Shortcode Output
<h1>SoldSteps Demo Import</h1><p>Click the button below to import the demo home page.</p>
FAQ

Frequently Asked Questions about SoldSteps Demo Import