SQL To CPT Security & Risk Analysis

wordpress.org/plugins/sql-to-cpt

Import & Convert SQL tables to Custom Post Types (CPT). Migrate legacy SQL table data to WordPress custom post types of your choice. It's super fast!

0 active installs v1.3.3 PHP 7.4+ WP 6.0+ Updated Nov 19, 2025
convertcptimportpostsql
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SQL To CPT Safe to Use in 2026?

Generally Safe

Score 100/100

SQL To CPT has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The 'sql-to-cpt' plugin v1.3.3 exhibits an excellent security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Crucially, the code adheres to best practices by utilizing prepared statements for all SQL queries and properly escaping all output, eliminating common SQL injection and cross-site scripting (XSS) vulnerabilities. The presence of nonce and capability checks further reinforces its security, indicating a developer conscious of access control.

While the static analysis reveals no critical or high-severity issues, the presence of a file operation without further context warrants a minor consideration. However, given the lack of external HTTP requests and the absence of any recorded vulnerabilities or CVEs in its history, this plugin appears to be exceptionally well-secured. The clean vulnerability history suggests a consistent commitment to security by the developers. Overall, 'sql-to-cpt' v1.3.3 presents a very low-risk profile, with strengths far outweighing any minor points of consideration.

Key Concerns

  • File operation without context
Vulnerabilities
None known

SQL To CPT Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SQL To CPT Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

SQL To CPT Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuinc\Services\Admin.php:25
actioninitinc\Services\Boot.php:25
filterupload_mimesinc\Services\Boot.php:26
actionadmin_enqueue_scriptsinc\Services\Boot.php:27
actioninitinc\Services\Post.php:64
actionrest_api_initinc\Services\Routes.php:53
actionadmin_noticessql-to-cpt.php:27
Maintenance & Trust

SQL To CPT Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 19, 2025
PHP min version7.4
Downloads925

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SQL To CPT Developer Profile

badasswp

13 plugins · 5K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SQL To CPT

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sql-to-cpt/dist/app.js
Script Paths
sql-to-cpt
Version Parameters
sql-to-cpt/dist/app.js?ver=1.2.0

HTML / DOM Fingerprints

JS Globals
sqlt
REST Endpoints
/wp-json/sql-to-cpt/v1/import/wp-json/sql-to-cpt/v1/parse/wp-json/sql-to-cpt/v1/purge
FAQ

Frequently Asked Questions about SQL To CPT