
WP Pipes Security & Risk Analysis
wordpress.org/plugins/wp-pipesRSS Feed to Post/bbPress, AutoBlogging, auto post to Twitter/Facebook/LinkedIn, CSV importing for Posts/WooCommerce/bbPress, RSS Feed Creator.
Is WP Pipes Safe to Use in 2026?
Critical Risk — Avoid
Score 20/100WP Pipes is critically unsafe with 9 known CVEs, 5 still unpatched. Avoid in production.
The wp-pipes plugin v1.4.3 presents a mixed security posture. While the static analysis indicates a very limited attack surface with no apparent direct entry points like AJAX handlers, REST API routes, or shortcodes, and a high percentage of SQL queries and output using prepared statements and proper escaping respectively, there are significant concerns. The presence of 10 dangerous `unserialize` function calls is a major red flag, as this function is notoriously susceptible to object injection vulnerabilities if not handled with extreme care, especially when processing untrusted data. Furthermore, the taint analysis revealed 11 flows with unsanitized paths, 4 of which are of high severity. This suggests that user-controlled input might be used to construct file paths or other critical data without adequate sanitization, potentially leading to serious security flaws.
The plugin's vulnerability history is deeply concerning. With a total of 9 known CVEs, 5 of which are currently unpatched, and a significant number of critical and high-severity vulnerabilities, this indicates a persistent pattern of insecure coding practices. The common vulnerability types listed, such as Remote File Inclusion, SQL Injection, Path Traversal, SSRF, and Cross-Site Scripting, are all serious and can lead to complete site compromise. The recent last vulnerability date further emphasizes that these issues have not been a relic of the past.
In conclusion, despite some positive indicators in the static analysis regarding SQL and output escaping, the extensive history of critical unpatched vulnerabilities and the identified dangerous functions and unsanitized taint flows paint a picture of high risk. The plugin's past and present security issues strongly suggest that it is not safe for use without significant remediation and thorough auditing.
Key Concerns
- Unpatched Critical CVEs (3)
- Unpatched High CVEs (2)
- Dangerous functions (unserialize)
- High severity taint flows (4)
- Flows with unsanitized paths (11)
- Medium severity CVEs (4)
WP Pipes Security Vulnerabilities
CVEs by Year
Severity Breakdown
9 total CVEs
WP Pipes <= 1.4.3 - Reflected Cross-Site Scripting
WP Pipes <= 1.4.3 - Unauthenticated Local File Inclusion
WP Pipes <= 1.4.3 - Unauthenticated SQL Injection
WP Pipes <= 1.4.3 - Unauthenticated Arbitrary File Deletion
WP Pipes <= 1.4.2 - Unauthenticated Arbitrary File Deletion
WP Pipes <= 1.4.3 - Authenticated (Administrator+) Server-Side Request Forgery
WP Pipes <= 1.4.1 - Reflected Cross-Site Scripting via x1 Parameter
WP Pipes <= 1.4.0 - Cross-Site Request Forgery to Settings Update
WP Pipes <= 1.33 - Authenticated (Admin+) SQL Injection
WP Pipes Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
WP Pipes Attack Surface
WordPress Hooks 8
Maintenance & Trust
WP Pipes Maintenance & Trust
Maintenance Signals
Community Trust
WP Pipes Alternatives
FeedWordPress
feedwordpress
FeedWordPress syndicates content from feeds you choose into your WordPress weblog.
RSS Chimp – Add Featured Images to WP RSS Feeds (Mailchimp, Google News, Feedly)
rss-chimp
Add featured images to RSS feeds for Mailchimp, Google News, Feedly and email newsletters. Enhance WordPress RSS feed with thumbnails for better email …
FeedWordPress Advanced Filters
faf
Author: Bas Schuiling
Syndicate Press
syndicate-press
Syndicate Press lets you include RSS, RDF or Atom feeds directly in your Wordpress posts, pages, widgets or theme.
Subscribe-Remind
subscribe-remind
Subscribe Remind will add a brief message at the bottom of each post inviting users to subscribe to your RSS feed or follow you on Twitter.
WP Pipes Developer Profile
21 plugins · 209K total installs
How We Detect WP Pipes
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-pipes/assets/css/obstyle.css/wp-content/plugins/wp-pipes/assets/css/bootstrap.min.css/wp-content/plugins/wp-pipes/assets/css/process.css/wp-content/plugins/wp-pipes/assets/css/chosen.css/wp-content/plugins/wp-pipes/assets/css/ad_style.css/wp-content/plugins/wp-pipes/assets/js/bootstrap.min.js/wp-content/plugins/wp-pipes/assets/js/process.js/wp-content/plugins/wp-pipes/assets/js/ogb-lib-admin.js+3 more/wp-content/plugins/wp-pipes/assets/js/bootstrap.min.js/wp-content/plugins/wp-pipes/assets/js/process.js/wp-content/plugins/wp-pipes/assets/js/ogb-lib-admin.js/wp-content/plugins/wp-pipes/assets/js/chosen.jquery.js/wp-content/plugins/wp-pipes/assets/js/angular.js/wp-content/plugins/wp-pipes/assets/js/ad_script.jsHTML / DOM Fingerprints
pipes-obstylepipes-bootstrap-minpipes-process-csspipes-chosen-csspipes-ads-csspipes-bootstrap-minpipes-processpipes-ogb-lib-admin+4 moredata-page_prefixdata-prefixPIPESpipes_settings