Findings
The plugin is extremely large at over 31,000 lines. Generates errors when run. Uses exec() without escaping its arguments. Contains unescaped SQL queries. Not all variables are escaped at the point where they are output. It allows listing the contents of directories. During testing it went berserk and caused a denial of service on one tester’s machine by getting stuck in an infinite loop after deleting a file.
Reason for the 'Potentially unsafe' result
The plugin contains or is likely to contain a vulnerability which could be exploited by an end user and which would compromise the site’s confidentiality, integrity or availability:
We found a large number of problems with this plugin despite not having enough time to inspect many of its 31,000 lines of code during this inspection.
We are confident that this plugin is unsafe.