Stream to Papertrail Security & Risk Analysis

wordpress.org/plugins/stream-to-papertrail

Send your Stream records to Papertrail for safe-keeping.

10 active installs v0.0.5 PHP + WP 4.3+ Updated Sep 8, 2015
actionshostedloggingpapertrailstream
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stream to Papertrail Safe to Use in 2026?

Generally Safe

Score 85/100

Stream to Papertrail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The stream-to-papertrail plugin, version 0.0.5, exhibits a mixed security posture. On the positive side, it has a remarkably small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no obvious entry points for attackers. Furthermore, the plugin demonstrates good practice by not executing any file operations or external HTTP requests, and all SQL queries are correctly handled with prepared statements. However, a significant concern arises from the presence of the `unserialize` function, which is inherently risky if the data being unserialized is not strictly controlled and validated. The lack of nonce checks and capability checks on any potential entry points (even though none were found statically) is also a weakness, as these are fundamental security mechanisms in WordPress. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator. However, this clean history, combined with the early version number and the identified risks like `unserialize`, might suggest that the plugin has not been extensively tested or that its limited functionality has thus far protected it from serious exploits. The 50% of output not being properly escaped is another area of concern that could lead to XSS vulnerabilities.

Key Concerns

  • Unescaped output detected
  • Presence of unserialize function without clear sanitization
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Stream to Papertrail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stream to Papertrail Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$record['meta']['user_meta'] = unserialize( $record['meta']['user_meta'] );inc\class-stream-papertrail-api.php:65

Output Escaping

50% escaped4 total outputs
Attack Surface

Stream to Papertrail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_noticesinc\class-stream-papertrail-api.php:10
filterwp_stream_settings_option_fieldsinc\class-stream-papertrail-api.php:17
actionadmin_noticesinc\class-stream-papertrail-api.php:20
actionwp_stream_record_insertedinc\class-stream-papertrail-api.php:23
actioninitstream-papertrail.php:16
Maintenance & Trust

Stream to Papertrail Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 8, 2015
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Stream to Papertrail Developer Profile

Japh

4 plugins · 160 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stream to Papertrail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<a href="https://papertrailapp.com/account/destinations" target="_blank">Log Destinations</a><a href="
FAQ

Frequently Asked Questions about Stream to Papertrail