
XServer Migrator Security & Risk Analysis
wordpress.org/plugins/xserver-migratorエックスサーバー株式会社が提供するレンタルサーバーサービスで「WordPress簡単移行機能」をご利用いただくためのプラグインです。
Is XServer Migrator Safe to Use in 2026?
Generally Safe
Score 90/100XServer Migrator has a strong security track record. Known vulnerabilities have been patched promptly.
The xserver-migrator plugin v1.6.6 exhibits a mixed security posture. On the positive side, it demonstrates good practices by having a completely protected attack surface with all AJAX handlers and no exposed REST API routes or shortcodes. The output escaping is also excellent at 90%. However, several concerning aspects warrant attention. The presence of 22 dangerous function calls, specifically 'exec', is a significant red flag, indicating a potential for arbitrary code execution if not handled with extreme care and rigorous input validation. While taint analysis did not reveal critical or high severity issues in this specific scan, the fact that all 4 analyzed flows had unsanitized paths is concerning and suggests potential vulnerabilities that might be subtle or not fully captured by the current analysis.
The plugin's vulnerability history shows a single high-severity CVE in the past, identified as Cross-Site Request Forgery (CSRF). While this CVE is currently patched, the existence of a past high-severity vulnerability, even if resolved, indicates a history of security weaknesses. The pattern of past vulnerabilities, though limited in number, combined with the static analysis findings of 'exec' usage and unsanitized paths, suggests a need for continued vigilance and thorough security auditing. Overall, while the current version has a secure entry point exposure and good output sanitization, the deep-seated use of dangerous functions and the concerning taint analysis results point to underlying risks that could be exploited if inputs are not meticulously validated and handled.
Key Concerns
- Dangerous function 'exec' usage detected
- All taint flows had unsanitized paths
- Past high severity vulnerability (CSRF)
- SQL queries not always using prepared statements
XServer Migrator Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Xserver Migrator <= 1.6.2 - Cross-Site Request Forgery to Arbitrary File Upload
XServer Migrator Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
XServer Migrator Attack Surface
AJAX Handlers 6
WordPress Hooks 3
Maintenance & Trust
XServer Migrator Maintenance & Trust
Maintenance Signals
Community Trust
XServer Migrator Alternatives
No alternatives data available yet.
XServer Migrator Developer Profile
2 plugins · 110K total installs
How We Detect XServer Migrator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/xserver-migrator/packages/css/xserver-migrator-admin.css/wp-content/plugins/xserver-migrator/packages/js/xserver-migrator-admin.js/wp-content/plugins/xserver-migrator/packages/js/xserver-migrator-admin.jsxserver-migrator/packages/css/xserver-migrator-admin.css?ver=xserver-migrator/packages/js/xserver-migrator-admin.js?ver=HTML / DOM Fingerprints
<!-- Xserver Migrator --><!-- Dump completed on YYYY-MM-DD HH:MM:SS -->name="xserver-migrator-nonce"content="window.xserver_migrator_nonce