
BP Site Post Security & Risk Analysis
wordpress.org/plugins/bp-site-postDesigned to work with BuddyPress Group, Members Only and Friends posts this front end post editor comes with a wide range of features to allow you to …
Is BP Site Post Safe to Use in 2026?
Generally Safe
Score 92/100BP Site Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The bp-site-post plugin v1.8.0 exhibits a mixed security posture. On the positive side, it demonstrates a strong commitment to secure coding practices with 100% of its SQL queries using prepared statements and a high rate of properly escaped outputs (92%). The absence of known CVEs and a clean vulnerability history are also encouraging signs, suggesting a generally well-maintained codebase.
However, there are significant security concerns stemming from its attack surface. The plugin exposes 4 total entry points, with 2 of them, specifically AJAX handlers, lacking authentication checks. This presents a direct avenue for unauthenticated users to interact with sensitive plugin functionalities. Furthermore, the presence of 2 dangerous function calls (create_function) and 2 flows with unsanitized paths, though not classified as critical or high severity in the taint analysis, warrants attention as potential precursors to vulnerabilities if not properly managed. The single external HTTP request also requires careful consideration of its destination and the data it transmits.
While the plugin scores well on many security metrics and has no recorded vulnerabilities, the unprotected AJAX handlers and the presence of potentially risky code constructs (dangerous functions, unsanitized paths) introduce notable risks. The limited number of identified entry points and the robust use of prepared statements and output escaping are strengths. Nevertheless, the unprotected AJAX endpoints are a clear vulnerability that needs immediate attention to prevent potential exploitation. A more thorough code review focusing on these specific areas would be beneficial.
Key Concerns
- Unprotected AJAX handlers
- Dangerous function used (create_function)
- Flows with unsanitized paths
- External HTTP request without clear context
BP Site Post Security Vulnerabilities
BP Site Post Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
BP Site Post Attack Surface
AJAX Handlers 3
Shortcodes 1
WordPress Hooks 33
Maintenance & Trust
BP Site Post Maintenance & Trust
Maintenance Signals
Community Trust
BP Site Post Alternatives
DJD Site Post
djd-site-post
Write and edit a post at the front end without leaving your site. Supports guest posts.
Post From Site
post-from-site
Write a post without leaving your site!
Gravity Forms: Post Updates
gravity-forms-post-updates
Allows you to use Gravity Forms to update any post on the front end.
Sewn In Post Delete
sewn-in-post-delete
A very basic framework for deleting posts on the front end. Uses a nonce for security and checks capabilities to what a user has access to.
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration
wp-user-frontend
Create forms, guest posts, subscriptions, user directory, user registration, membership, frontend posts, profile builder, content restriction rules.
BP Site Post Developer Profile
20 plugins · 640 total installs
How We Detect BP Site Post
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/bp-site-post/css/display.css/wp-content/plugins/bp-site-post/js/display.js/wp-content/plugins/bp-site-post/js/script.js/wp-content/plugins/bp-site-post/inc/bpsp-template-tags.php/wp-content/plugins/bp-site-post/inc/bp-members.php/wp-content/plugins/bp-site-post/inc/bpsp-widget.phpbp-site-post/js/display.jsbp-site-post/js/script.jsbp-site-post/css/display.css?ver=bp-site-post/js/display.js?ver=bp-site-post/js/script.js?ver=HTML / DOM Fingerprints
<!-- Todo: put in place check for two people editing the same post at the same time. -->ajax_object[bp-site-post]