
LJ-XP-SW Security & Risk Analysis
wordpress.org/plugins/crossposting-in-safe-wayLJ-XP-SW a plugin, that has the ability to crosspost a blog text to your LiveJournal (or LiveJournal-based clone) account in safe way.
Is LJ-XP-SW Safe to Use in 2026?
Generally Safe
Score 85/100LJ-XP-SW has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'crossposting-in-safe-way' plugin v1.2 exhibits a mixed security posture. While it appears to have a very limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, this could also be interpreted as a lack of functionality exposed to user interaction, which is a positive sign. However, the code analysis reveals significant concerns. The presence of the dangerous `create_function` is a notable risk, as it can lead to code injection vulnerabilities if user-supplied input is passed to it without proper sanitization. Furthermore, a substantial percentage of SQL queries are not using prepared statements, which exposes the plugin to SQL injection risks. The complete lack of output escaping for all identified outputs is a critical security flaw, making the plugin highly susceptible to Cross-Site Scripting (XSS) attacks. The absence of nonce and capability checks on any potential entry points further exacerbates these risks, as there are no built-in mechanisms to verify user authorization or prevent CSRF attacks. The plugin's vulnerability history is clean, with no recorded CVEs, which might suggest a lack of targeted attacks or previous diligent patching. However, this clean history should not overshadow the significant security weaknesses identified in the static analysis, particularly the unescaped output and the insecure SQL practices.
Key Concerns
- Dangerous function used (create_function)
- SQL queries without prepared statements
- Output escaping not used
- Missing nonce checks
- Missing capability checks
LJ-XP-SW Security Vulnerabilities
LJ-XP-SW Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
LJ-XP-SW Attack Surface
WordPress Hooks 9
Maintenance & Trust
LJ-XP-SW Maintenance & Trust
Maintenance Signals
Community Trust
LJ-XP-SW Alternatives
LJ user ex
lj-user-ex
Replaces <lj user="username"/> and <lj comm="community"/> with correct HTML code.
No Page Comment
no-page-comment
An admin interface to control the default comment and trackback settings on new posts, pages and custom post types.
No External Links
mihdan-no-external-links
Convert external links into internal links, site wide or post/page specific. Add NoFollow, Click logging, and more...
news ticker benaceur
news-ticker-benaceur
This plugin allow you to display the latest posts or latest comments in a bar with twenty seven beautiful animations and effects...
Disable Feeds and Comments
disable-rss-feeds-and-comments
This WordPress plugin, "Disable RSS Feeds and Comments," gives you the ability to turn off both the RSS feeds and comments on pages and/or p …
LJ-XP-SW Developer Profile
1 plugin · 10 total installs
How We Detect LJ-XP-SW
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/crossposting-in-safe-way/ljxp_admin.jsHTML / DOM Fingerprints
<!-- Warning. This is rather UNSAFE code. The only reason for it to remain unchanged so far is that it is inside a protected area. -- FreeAtNet --><!-- TODO: fix security where appropriate --><!-- May add some Javascript to disable the custom_name field later - don't --><!-- feel like it now, though -->name="host"name="username"name="password"name="community"name="custom_name_on"name="custom_name"+18 morevar ljxp_admin_js_url