Add Dummy Post Security & Risk Analysis

wordpress.org/plugins/add-dummy-post

Add Dummy Post plugin allows user to add post in their WordPress website.

30 active installs v1.0.3 PHP 5.2.4+ WP 4.9+ Updated Dec 13, 2023
add-dummy-postdummy-datadummy-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Add Dummy Post Safe to Use in 2026?

Generally Safe

Score 85/100

Add Dummy Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "add-dummy-post" plugin v1.0.3 exhibits a generally good security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, or shortcodes significantly limits the attack surface. Furthermore, the code demonstrates strong security practices by using prepared statements for all SQL queries, implementing nonce checks, and capability checks, which are crucial for preventing common web vulnerabilities. The plugin also shows no history of known vulnerabilities, indicating a potentially stable and well-maintained codebase.

However, a notable concern is the moderate level of output escaping, with only 43% of outputs being properly escaped. This suggests a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled with sufficient sanitization before being displayed. While taint analysis found no critical or high severity flows, this finding is based on zero flows being analyzed, which might not cover all potential attack vectors. The lack of any recorded vulnerabilities is positive but could also be attributed to the limited attack surface and perhaps limited public scrutiny.

In conclusion, the "add-dummy-post" plugin is likely to be relatively secure due to its minimal attack surface and good use of security controls like prepared statements and nonce checks. The primary weakness lies in the insufficient output escaping, which presents a potential XSS risk. The absence of known vulnerabilities is a good sign, but the limited taint analysis and the output escaping issue warrant careful consideration for any site relying on this plugin.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Add Dummy Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Add Dummy Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
3 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped7 total outputs
Attack Surface

Add Dummy Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initadd-dummy-post.php:49
actionadmin_menubackend\includes\adp-back-end-custom-functions.php:23
actioninitbackend\includes\adp-back-end-custom-functions.php:34
actionadmin_post_adp_handle_form_submissionbackend\methods\adp-import-functions.php:128
actionadmin_post_nopriv_adp_handle_form_submissionbackend\methods\adp-import-functions.php:129
Maintenance & Trust

Add Dummy Post Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 13, 2023
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Add Dummy Post Developer Profile

Shubham Sedani

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Add Dummy Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/add-dummy-post/backend/assets/public-style.css/wp-content/plugins/add-dummy-post/backend/assets/public-script.js
Script Paths
/wp-content/plugins/add-dummy-post/backend/assets/public-script.js
Version Parameters
add-dummy-post/backend/assets/public-style.css?ver=add-dummy-post/backend/assets/public-script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Add Dummy Post