wp2epub Security & Risk Analysis

wordpress.org/plugins/wp2epub

wp2epub generate ePub files directly from WordPress.

60 active installs v0.65 PHP + WP 2.7+ Updated Feb 1, 2013
ebookepubhtmlipadwp2epub
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is wp2epub Safe to Use in 2026?

Generally Safe

Score 85/100

wp2epub has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wp2epub plugin exhibits a mixed security posture. On the positive side, it has a small attack surface with no AJAX handlers or REST API routes, and all its SQL queries utilize prepared statements. Furthermore, there is no recorded vulnerability history, suggesting a potentially well-maintained codebase or a lack of prior scrutiny. However, significant concerns arise from the static analysis. The presence of 'unserialize' as a dangerous function, coupled with 4 high-severity taint flows involving unsanitized paths, points to a critical risk of remote code execution or data manipulation if these paths are exploitable. The extremely low percentage of properly escaped output (7%) indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into user browsers. The complete absence of nonce checks and capability checks further amplifies these risks, as it means that many actions may not be properly authorized or protected against replay attacks. While the lack of historical CVEs is reassuring, the identified code signals and taint analysis present immediate and severe potential threats that need to be addressed.

Key Concerns

  • Dangerous function unserialize used
  • High severity taint flows (unsanitized paths)
  • Low proper output escaping (potential XSS)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

wp2epub Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

wp2epub Code Analysis

Dangerous Functions
5
Raw SQL Queries
0
21 prepared
Unescaped Output
53
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
127
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$imgcover=unserialize($e->epub_cover);wp2epub.class.php:440
unserialize$efile=unserialize($e);wp2epub.class.php:633
unserialize$imgcover=unserialize($efile->epub_cover);wp2epub.class.php:733
unserialize$imgcover=unserialize($efile->epub_postcover);wp2epub.class.php:969
unserialize$imgcover=unserialize($efile->epub_cover);wp2epub.class.php:972

SQL Query Safety

100% prepared21 total queries

Output Escaping

7% escaped57 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
parse (myphp\list.php:64)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

wp2epub Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp2epub] wp2epub.php:53
WordPress Hooks 2
actionadmin_menuwp2epub.php:21
actionsave_postwp2epub.php:40
Maintenance & Trust

wp2epub Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedFeb 1, 2013
PHP min version
Downloads40K

Community Trust

Rating66/100
Number of ratings3
Active installs60
Developer Profile

wp2epub Developer Profile

tcrouzet

3 plugins · 80 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect wp2epub

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp2epub/images/

HTML / DOM Fingerprints

CSS Classes
w2epub
Data Attributes
data-epub
Shortcode Output
<a href="/wp-content/epub/?epub=</a><img src="/wp-content/plugins/wp2epub/images/epub1.png" style="width:44px;height:20px;margin-bottom:0" title="Download epub"/>
FAQ

Frequently Asked Questions about wp2epub