WP Plugin Packer Security & Risk Analysis

wordpress.org/plugins/wp-plugin-packer

WP Plugin Packer lets you create plugin packs (=groups) to export and import to various WordPress websites.

10 active installs v1.0.0 PHP + WP 3.9+ Updated Mar 19, 2015
packsplugin-groupplugins
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Plugin Packer Safe to Use in 2026?

Generally Safe

Score 85/100

WP Plugin Packer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "wp-plugin-packer" v1.0.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, using prepared statements for all SQL queries, and having no recorded vulnerabilities or CVEs in its history. This suggests a generally careful development approach regarding common web security pitfalls. However, the static analysis reveals significant areas for concern.

The plugin's attack surface is relatively small but contains a critical weakness: one of its two AJAX handlers lacks proper authentication checks. This presents a direct avenue for unauthorized actions if exploited. Furthermore, the taint analysis indicates that a substantial portion of analyzed data flows (3 out of 4) involve unsanitized paths, even though no critical or high-severity vulnerabilities were found in this analysis. This could imply a latent risk of path traversal or similar vulnerabilities that might not be immediately apparent without further deeper investigation or specific exploit attempts.

While the absence of historical vulnerabilities is a positive indicator, it doesn't negate the risks identified in the current code. The lack of capability checks on an AJAX handler and the presence of unsanitized paths are significant security liabilities that need immediate attention. The plugin's strengths lie in its SQL handling and lack of historical issues, but its current implementation introduces notable risks that could be exploited by attackers.

Key Concerns

  • AJAX handler without auth checks
  • Unsanitized paths in taint flows
  • Low output escaping percentage
  • No capability checks
Vulnerabilities
None known

WP Plugin Packer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Plugin Packer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
7 escaped
Nonce Checks
3
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

64% escaped11 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
plugin_packer_init (admin\class-wp-plugin-packer-admin.php:68)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP Plugin Packer Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 2

authwp_ajax_wp_plugin_packer_import_fileadmin\class-wp-plugin-packer-admin.php:31
authwp_ajax_sanitize_titleadmin\class-wp-plugin-packer-admin.php:32
WordPress Hooks 8
actionadmin_menuadmin\class-wp-plugin-packer-admin.php:28
actionadmin_initadmin\class-wp-plugin-packer-admin.php:29
actionupload_mimesadmin\class-wp-plugin-packer-admin.php:30
actionupgrader_process_completeadmin\class-wp-plugin-packer-admin.php:33
actionadmin_noticesadmin\class-wp-plugin-packer-admin.php:34
actionplugins_loadedincludes\class-wp-plugin-packer.php:88
actionadmin_enqueue_scriptsincludes\class-wp-plugin-packer.php:103
actionadmin_enqueue_scriptsincludes\class-wp-plugin-packer.php:104
Maintenance & Trust

WP Plugin Packer Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 19, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

WP Plugin Packer Developer Profile

AZdv

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Plugin Packer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-plugin-packer/admin/css/wp-plugin-packer-admin.css
Script Paths
/wp-content/plugins/wp-plugin-packer/admin/js/wp-plugin-packer-admin.js
Version Parameters
wp-plugin-packer/admin/css/wp-plugin-packer-admin.css?ver=wp-plugin-packer/admin/js/wp-plugin-packer-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
drag-and-dropsingle-packsingle-pack-titleselect-packpack-titlepack-slugwidefatplugins+10 more
Data Attributes
data-hintdata-hint="Click to edit"
JS Globals
translationStrings
FAQ

Frequently Asked Questions about WP Plugin Packer