WP-JPOST Security & Risk Analysis

wordpress.org/plugins/wp-jpost

1、抓取采集网站固定内容并保存到Wordpress中。

10 active installs v2.1.0 PHP 7.4+ WP + Updated Apr 23, 2023
crawl%e9%87%87%e9%9b%86grab
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-JPOST Safe to Use in 2026?

Generally Safe

Score 85/100

WP-JPOST has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The wp-jpost plugin v2.1.0 demonstrates a generally strong security posture based on the provided static analysis and vulnerability history. The plugin exhibits good practices by implementing nonce and capability checks on its single AJAX entry point, indicating an awareness of common WordPress security vulnerabilities. Furthermore, the absence of any recorded CVEs or taint analysis findings with unsanitized paths suggests a commitment to secure coding. The high percentage of properly escaped outputs and the presence of some prepared statements in its SQL queries also contribute positively to its security profile.

While the overall picture is positive, there are minor areas for improvement. A significant portion of SQL queries (75%) are not using prepared statements, which could represent a potential risk if those queries involve user-controlled input, even though no critical taint flows were detected. The presence of file operations and external HTTP requests, while not inherently insecure, are entry points that require vigilant maintenance to prevent future vulnerabilities. However, given the lack of historical vulnerabilities and the robust implementation of entry point security, the current risk appears low.

In conclusion, wp-jpost v2.1.0 is a well-secured plugin with a clean vulnerability history and strong adherence to basic security principles like nonce and capability checks. The primary area of potential concern lies in the un-prepared SQL queries, though this risk is mitigated by the absence of detected taint flows and historical exploits. The plugin's strengths in secure entry point handling and output escaping far outweigh its minor weaknesses, making it a relatively safe option.

Key Concerns

  • SQL queries not using prepared statements (75%)
Vulnerabilities
None known

WP-JPOST Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP-JPOST Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
1 prepared
Unescaped Output
7
64 escaped
Nonce Checks
1
Capability Checks
3
File Operations
3
External Requests
2
Bundled Libraries
0

SQL Query Safety

25% prepared4 total queries

Output Escaping

90% escaped71 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
iframe_callback (includes\class-jpost-grab.php:791)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-JPOST Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_jpost_iframeincludes\class-jpost-grab.php:46
WordPress Hooks 17
actiontemplate_redirectincludes\class-jpost-grab.php:44
filterquery_varsincludes\class-jpost-grab.php:45
actionwp_enqueue_scriptsincludes\class-jpost-grab.php:47
actionwp_before_admin_bar_renderincludes\class-jpost-grab.php:402
actionplugins_loadedincludes\class-wp-jpost.php:47
actioninitincludes\class-wp-jpost.php:48
filterpost_updated_messagesincludes\class-wp-jpost.php:50
actionadmin_menuincludes\class-wp-jpost.php:52
actionsave_postincludes\class-wp-jpost.php:53
actionmanage_wp-jpost_posts_custom_columnincludes\class-wp-jpost.php:54
filtermanage_wp-jpost_posts_columnsincludes\class-wp-jpost.php:55
filtermanage_edit-post_columnsincludes\class-wp-jpost.php:56
actionmanage_posts_custom_columnincludes\class-wp-jpost.php:57
actionadmin_noticesincludes\class-wp-jpost.php:58
actionadmin_enqueue_scriptsincludes\class-wp-jpost.php:59
actioninitincludes\class-wp-jpost.php:60
actionwp_before_admin_bar_renderincludes\class-wp-jpost.php:61
Maintenance & Trust

WP-JPOST Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedApr 23, 2023
PHP min version7.4
Downloads85K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-JPOST Developer Profile

_jerryjee

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-JPOST

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-jpost/assets/css/jpost.css
Version Parameters
wp-jpost/assets/css/jpost.css?ver=

HTML / DOM Fingerprints

JS Globals
jpost_char2UTF8jpost_insertKjpost_query_varsjpost_Handleget_list_hrefjpost_grab+3 more
FAQ

Frequently Asked Questions about WP-JPOST