wp2d Auto Post Security & Risk Analysis

wordpress.org/plugins/wp2d-auto-post

Auto-posting the announces of publishing posts to the Discord channel.

10 active installs v1.0.0 PHP 7.0+ WP 5.8+ Updated Sep 25, 2021
auto-postchanneldiscordpublishserver
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wp2d Auto Post Safe to Use in 2026?

Generally Safe

Score 85/100

wp2d Auto Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The wp2d-auto-post plugin v1.0.0 exhibits a generally strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with exposed attack surfaces is a significant positive. Furthermore, the adherence to prepared statements for all SQL queries demonstrates a commitment to preventing SQL injection vulnerabilities.

However, there are notable areas of concern. The extremely low percentage of properly escaped output (11%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is outputted to the browser without adequate sanitization or escaping could be exploited to inject malicious scripts. While there are no known CVEs or taint flows recorded, this is likely due to the limited attack surface and the absence of complex logic that would typically generate such issues in static analysis. The presence of external HTTP requests, while only one, also warrants careful consideration, as it could be a vector for Server-Side Request Forgery (SSRF) or other vulnerabilities if not handled securely.

In conclusion, while the plugin's minimal attack surface and secure database practices are commendable, the severe lack of output escaping poses a significant risk. The absence of past vulnerabilities is likely a byproduct of its limited functionality and attack surface rather than inherent robust security in all aspects. Prioritizing proper output escaping is crucial to mitigate the XSS risks. The single external HTTP request should also be reviewed for security implications.

Key Concerns

  • Low output escaping percentage
  • External HTTP request present
Vulnerabilities
None known

wp2d Auto Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

wp2d Auto Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

11% escaped9 total outputs
Attack Surface

wp2d Auto Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiontransition_post_statuswp2d.php:135
actionadmin_menuwp2d.php:150
actionadmin_initwp2d.php:190
actionadd_meta_boxeswp2d.php:266
actionsave_postwp2d.php:267
Maintenance & Trust

wp2d Auto Post Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 25, 2021
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

wp2d Auto Post Developer Profile

korchiy

2 plugins · 310 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect wp2d Auto Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
wp2d_do_autopostwp2d_metabox
FAQ

Frequently Asked Questions about wp2d Auto Post