
Dispito – discussions and comments Security & Risk Analysis
wordpress.org/plugins/dispitoThe Dispito comment system replaces your WordPress comment system with your comments hosted and powered by Dispito.
Is Dispito – discussions and comments Safe to Use in 2026?
Generally Safe
Score 85/100Dispito – discussions and comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "dispito" v1.0.1 plugin exhibits a generally positive security posture based on the static analysis. The plugin has a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions and file operations suggests a careful approach to development. The plugin also avoids making external HTTP requests, which can be a source of vulnerabilities. The zero-known CVEs and lack of recorded vulnerabilities in its history are strong indicators of a well-maintained and secure plugin.
However, there are significant concerns regarding output escaping, with 0% of identified outputs being properly escaped. This presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website's output. Additionally, while the plugin uses prepared statements for some SQL queries, a considerable portion (67%) do not, posing a risk of SQL injection vulnerabilities. The absence of nonce and capability checks, coupled with a complete lack of taint analysis findings (which might indicate the analysis couldn't find entry points to track), suggests that if any exploitable paths do exist, they might not be adequately protected against unauthorized actions or data manipulation.
In conclusion, while the plugin's limited attack surface and clean vulnerability history are strengths, the critical issues of unescaped output and raw SQL queries, along with the missing security checks, introduce significant risks that need immediate attention. The lack of taint analysis flows being detected could be an indication of its limited scope or the absence of complex data manipulation, but the presence of raw SQL and unescaped output are direct indicators of exploitable flaws.
Key Concerns
- Output escaping is not performed
- SQL queries are not fully using prepared statements
- Nonce checks are missing
- Capability checks are missing
Dispito – discussions and comments Security Vulnerabilities
Dispito – discussions and comments Code Analysis
SQL Query Safety
Output Escaping
Dispito – discussions and comments Attack Surface
WordPress Hooks 4
Maintenance & Trust
Dispito – discussions and comments Maintenance & Trust
Maintenance Signals
Community Trust
Dispito – discussions and comments Alternatives
Disqus Comment System
disqus-comment-system
Disqus is the web's most popular comment system. Use Disqus to increase engagement, retain readers, and grow your audience.
Post Comments as bbPress Topics
bbpress-post-topics
Replace the comments on your WordPress blog posts with topics from an integrated bbPress install
replyMail
replymail
Enhance the threaded comments system of WordPress 2.7. When someone reply to your comment, send a email to you.
Logora
logora
Logora is the web's most popular debate platform.
Yappa Widget
yappa-widget
Yappa is the web's most popular comment system. Use Yappa to increase engagement, retain readers, and grow your audience.
Dispito – discussions and comments Developer Profile
1 plugin · 10 total installs
How We Detect Dispito – discussions and comments
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/dispito/embed.jsHTML / DOM Fingerprints
dispito_thread