Import into Schema.org by WordLift Security & Risk Analysis

wordpress.org/plugins/wordlift-add-on-for-wp-all-import

Easily import structured data and schema.org settings from any XML or CSV file to WordLift knowledge graph.

10 active installs v1.0.1 PHP 5.3+ WP 4.3+ Updated Jul 26, 2023
import-seosearch-engine-optimizationseowordliftwp-all-import
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Import into Schema.org by WordLift Safe to Use in 2026?

Generally Safe

Score 85/100

Import into Schema.org by WordLift has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'wordlift-add-on-for-wp-all-import' plugin v1.0.1 presents a mixed security posture. On the positive side, the static analysis reveals a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication checks. Furthermore, all identified SQL queries utilize prepared statements, which is a strong security practice. The plugin also has a clean vulnerability history with no recorded CVEs, suggesting a generally stable and well-maintained codebase.

However, there are significant concerns stemming from the code analysis. The presence of the `unserialize` function is a critical risk, as it can lead to Remote Code Execution (RCE) vulnerabilities if it processes untrusted input. The low percentage of properly escaped output (45%) indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the absence of nonce and capability checks on any entry points means that any interaction with these functions, even if not directly exposed via AJAX or REST API, could be manipulated if input validation is not robust. The single file operation also warrants scrutiny to ensure it's not susceptible to directory traversal or other file-based attacks.

In conclusion, while the plugin's limited attack surface and lack of historical vulnerabilities are commendable, the identified risks related to `unserialize`, unescaped output, and missing authorization checks are substantial. These represent potential entry points for attackers to compromise WordPress sites. Prioritizing the secure handling of unserialized data and implementing comprehensive output escaping and authorization checks would significantly improve the plugin's security.

Key Concerns

  • Use of unserialize function
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
  • Single file operation requires scrutiny
Vulnerabilities
None known

Import into Schema.org by WordLift Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Import into Schema.org by WordLift Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$fieldData = (!empty($field_params['field_obj']->post_content)) ? unserialize($field_params['field_orapid-addon.php:559

Output Escaping

45% escaped11 total outputs
Attack Surface

Import into Schema.org by WordLift Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
actionplugins_loadedall-import-wordlift-add-on.php:21
actionadmin_noticesall-import-wordlift-add-on.php:77
filterpmxi_addonsrapid-addon.php:144
filterwp_all_import_addon_parserapid-addon.php:145
filterwp_all_import_addon_importrapid-addon.php:146
filterwp_all_import_addon_saved_postrapid-addon.php:147
filterpmxi_options_optionsrapid-addon.php:148
filterwp_all_import_image_sectionsrapid-addon.php:149
filterpmxi_custom_typesrapid-addon.php:150
filterpmxi_post_list_orderrapid-addon.php:151
filterwp_all_import_post_type_imagerapid-addon.php:152
actionpmxi_extend_options_featuredrapid-addon.php:153
actionadmin_initrapid-addon.php:154
filterwp_all_import_acf_is_show_grouprapid-addon.php:219
filterwp_all_import_is_show_add_new_imagesrapid-addon.php:924
filterwp_all_import_is_allow_import_imagesrapid-addon.php:927
filterwp_all_import_is_images_section_enabledrapid-addon.php:976
actionadmin_noticesrapid-addon.php:1171
Maintenance & Trust

Import into Schema.org by WordLift Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedJul 26, 2023
PHP min version5.3
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Import into Schema.org by WordLift Developer Profile

David Riccitelli

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Import into Schema.org by WordLift

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wordlift-add-on-for-wp-all-import/rapid-addon.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Import into Schema.org by WordLift