Findings
- At over 31,000 lines of PHP, this is a very large plugin and a light-touch inspection such as this cannot be expected to find all potential issues
- Uses unserialize() and maybe_unserialize() in several places, also contains classes with methods that would be useful when performing PHP object injection (i.e. __toString())
- Uses addcslashes() to escape string values in SQL
Reason for the 'Use with caution' result
The plugin contains or is likely to contain a vulnerability which could be exploited by a privileged user to affect the site’s confidentiality, integrity or availability in a manner exceeding their privileges:
- Uses addcslashes() to escape string values in SQL