Zippy Security & Risk Analysis

wordpress.org/plugins/zippy

Incredibly easy solution to archive pages and posts as zip file and unpack them back even on the other website!

10K active installs v1.7.0 PHP + WP 4.9+ Updated Sep 30, 2025
archivebackupcustom-post-typesmigrationzip-files
71
B · Generally Safe
CVEs total5
Unpatched1
Last CVEAug 27, 2024
Download
Safety Verdict

Is Zippy Safe to Use in 2026?

Mostly Safe

Score 71/100

Zippy is generally safe to use. 5 past CVEs were resolved.

5 known CVEs 1 unpatched Last CVE: Aug 27, 2024Updated 7mo ago
Risk Assessment

The "zippy" v1.7.0 plugin exhibits a mixed security posture. While it demonstrates some good practices, such as a relatively low number of SQL queries and a high percentage of prepared statements, along with proper output escaping and capability checks, several concerning signals are present. The static analysis reveals the presence of a dangerous `unserialize` function, which is a significant risk, especially when not handled with extreme caution. The taint analysis shows no unsanitized paths, which is a positive indicator, but the existence of the `unserialize` function remains a potential entry point for vulnerabilities if user-supplied data is processed without strict validation.

The plugin's vulnerability history is a major concern. With a total of 5 known CVEs, including 3 high and 2 medium severity vulnerabilities, and crucially, one currently unpatched vulnerability, the risk is significantly elevated. The common vulnerability types identified – Unrestricted Upload of File with Dangerous Type, Missing Authorization, Deserialization of Untrusted Data, and Exposure of Sensitive Information – align with the `unserialize` function identified in the static analysis and suggest recurring security flaws within the plugin's development. The recent vulnerability in August 2024 further emphasizes the ongoing nature of these issues.

In conclusion, while "zippy" v1.7.0 has some positive security attributes, the presence of a dangerous function like `unserialize` and a history of multiple, including unpatched, critical and high-severity vulnerabilities overwhelmingly point to a high-risk plugin. Users should exercise extreme caution and consider migrating to a more secure alternative or thoroughly auditing and patching any identified vulnerabilities before deployment.

Key Concerns

  • Unpatched CVE
  • High severity vulnerabilities (3)
  • Medium severity vulnerabilities (2)
  • Dangerous function (unserialize)
Vulnerabilities
5 published

Zippy Security Vulnerabilities

CVEs by Year

3 CVEs in 2023
2023
2 CVEs in 2024 · unpatched
2024
Patched Has unpatched

Severity Breakdown

High
3
Medium
2

5 total CVEs

CVE-2025-52758high · 7.2Unrestricted Upload of File with Dangerous Type

Zippy <= 1.7.0 - Authenticated (Editor+) Arbitrary File Upload

Aug 27, 2024Unpatched
CVE-2024-27964high · 7.2Unrestricted Upload of File with Dangerous Type

Zippy <= 1.6.9 - Authenticated (Editor+) Arbitrary File Upload

Mar 13, 2024 Patched in 1.6.10 (8d)
CVE-2023-34381medium · 6.5Missing Authorization

Zippy <= 1.6.2 - Missing Authorization via adminInit

Jul 12, 2023 Patched in 1.6.3 (195d)
CVE-2023-36381high · 7.5Deserialization of Untrusted Data

Zippy <= 1.6.5 - Authenticated(Author+) PHP Object Injection via unzipPosts

Jun 28, 2023 Patched in 1.6.6 (209d)
CVE-2023-26533medium · 4.3Exposure of Sensitive Information to an Unauthorized Actor

Zippy <= 1.6.1 - Authenticated (Contributor+) Sensitive Information Disclosure

Mar 30, 2023 Patched in 1.6.2 (299d)
Code Analysis
Analyzed Mar 16, 2026

Zippy Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
6 prepared
Unescaped Output
3
20 escaped
Nonce Checks
1
Capability Checks
5
File Operations
5
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = @unserialize($content, [ZippyCore.php:117

SQL Query Safety

86% prepared7 total queries

Output Escaping

87% escaped23 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
adminInit (ZippyCore.php:151)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Zippy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initZippyCore.php:18
actionadmin_bar_menuZippyCore.php:19
actionadmin_menuZippyCore.php:20
actionadmin_headZippyCore.php:21
actionadmin_enqueue_scriptsZippyCore.php:22
actionadmin_footerZippyCore.php:23
actionadmin_noticesZippyCore.php:24
actionplugins_loadedZippyCore.php:25
Maintenance & Trust

Zippy Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 30, 2025
PHP min version
Downloads229K

Community Trust

Rating92/100
Number of ratings16
Active installs10K
Developer Profile

Zippy Developer Profile

Gesundheit Bewegt GmbH

2 plugins · 10K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
178 days
View full developer profile
Detection Fingerprints

How We Detect Zippy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zippy/css/admin.css/wp-content/plugins/zippy/css/style.css/wp-content/plugins/zippy/js/admin.js/wp-content/plugins/zippy/js/zippy.js
Script Paths
/wp-content/plugins/zippy/js/admin.js/wp-content/plugins/zippy/js/zippy.js
Version Parameters
zippy/css/admin.css?ver=zippy/css/style.css?ver=zippy/js/admin.js?ver=zippy/js/zippy.js?ver=

HTML / DOM Fingerprints

CSS Classes
zippy-boxzippy-file-upload
HTML Comments
<!-- Zippy zip --><!-- Zippy unzip --><!-- Zippy settings -->
Data Attributes
data-zippy-noncedata-zippy-actiondata-zippy-target
JS Globals
zippy_params
Shortcode Output
[zippy_unzip]
FAQ

Frequently Asked Questions about Zippy