LJ-XP-SW Security & Risk Analysis

wordpress.org/plugins/crossposting-in-safe-way

LJ-XP-SW a plugin, that has the ability to crosspost a blog text to your LiveJournal (or LiveJournal-based clone) account in safe way.

10 active installs v1.2 PHP + WP 2.5.0+ Updated Mar 18, 2010
commentscrosspostcrossposterlivejournalposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LJ-XP-SW Safe to Use in 2026?

Generally Safe

Score 85/100

LJ-XP-SW has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'crossposting-in-safe-way' plugin v1.2 exhibits a mixed security posture. While it appears to have a very limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, this could also be interpreted as a lack of functionality exposed to user interaction, which is a positive sign. However, the code analysis reveals significant concerns. The presence of the dangerous `create_function` is a notable risk, as it can lead to code injection vulnerabilities if user-supplied input is passed to it without proper sanitization. Furthermore, a substantial percentage of SQL queries are not using prepared statements, which exposes the plugin to SQL injection risks. The complete lack of output escaping for all identified outputs is a critical security flaw, making the plugin highly susceptible to Cross-Site Scripting (XSS) attacks. The absence of nonce and capability checks on any potential entry points further exacerbates these risks, as there are no built-in mechanisms to verify user authorization or prevent CSRF attacks. The plugin's vulnerability history is clean, with no recorded CVEs, which might suggest a lack of targeted attacks or previous diligent patching. However, this clean history should not overshadow the significant security weaknesses identified in the static analysis, particularly the unescaped output and the insecure SQL practices.

Key Concerns

  • Dangerous function used (create_function)
  • SQL queries without prepared statements
  • Output escaping not used
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

LJ-XP-SW Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LJ-XP-SW Code Analysis

Dangerous Functions
1
Raw SQL Queries
3
4 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$modify = create_function('$f, $n, $obj', 'global $$f; $p = &$$f; unset($p[$n]); $p[$obj->term_id] =lj-xp-sw.php:524

SQL Query Safety

57% prepared7 total queries

Output Escaping

0% escaped6 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ljxp_display_options (lj-xp-sw.php:60)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

LJ-XP-SW Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menulj-xp-sw.php:861
actionpublish_postlj-xp-sw.php:863
actionpublish_future_postlj-xp-sw.php:864
actionedit_postlj-xp-sw.php:865
actiondelete_postlj-xp-sw.php:866
actiondbx_post_sidebarlj-xp-sw.php:867
actionpublish_postlj-xp-sw.php:868
actionsave_postlj-xp-sw.php:869
actionedit_postlj-xp-sw.php:870
Maintenance & Trust

LJ-XP-SW Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedMar 18, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

LJ-XP-SW Developer Profile

GrayHunter

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LJ-XP-SW

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/crossposting-in-safe-way/ljxp_admin.js

HTML / DOM Fingerprints

HTML Comments
<!-- Warning. This is rather UNSAFE code. The only reason for it to remain unchanged so far is that it is inside a protected area. -- FreeAtNet --><!-- TODO: fix security where appropriate --><!-- May add some Javascript to disable the custom_name field later - don't --><!-- feel like it now, though -->
Data Attributes
name="host"name="username"name="password"name="community"name="custom_name_on"name="custom_name"+18 more
JS Globals
var ljxp_admin_js_url
FAQ

Frequently Asked Questions about LJ-XP-SW