Plugin inspection:


Use with caution

Last revised:

Confidence: Medium
This plugin has been given a short, targeted code review.

Before using this plugin, you should carefully consider these findings. Read more about this recommendation.


  • Overrides memory_limit option
  • Contains the ability to transmit data from one WordPress installation to another. A detailed security audit of the protocol used would be outside of the scope of a light-touch inspection such as this
  • Appears to use unserialize() as part of the protocol. Depending on what classes are available in this plugin or other active plugins, unserialize() can lead to arbitrary code execution
  • Unlinks files without checking they reside within a particular directory. Unknown if this can be exploited
  • Checks for new versions via HTTP instead of HTTPS, though it seems that there’s not much a MITM attack could achieve in this case
  • The plugin contains a comment which recommends disabling TLS verification “as a last resort” (this is probably a bad idea, even as a last resort): “Define RAMP_DISABLE_SSL_VERIFY as true to disable SSL certificate validation. This significantly reduces the security of SSL, but may be necessary in environments where WordPress cannot validate the production SSL certificate. Use this as a last resort if you are seeing this error: Error (-32300): transport error: http_request_failed SSL certificate problem: Invalid certificate chain”

Reason for the 'Use with caution' result

The plugin contains or is likely to contain a vulnerability which could be exploited by a privileged user to affect the site’s confidentiality, integrity or availability in a manner exceeding their privileges:

  • Use of unserialize() could potentially lead to ACE in certain situations
  • Use of unlink() without checking for attempts at directory traversal

Failure criteria

  • Unsafe file or network IO

Read more about our failure criteria.