DJD Site Post Security & Risk Analysis

wordpress.org/plugins/djd-site-post

Write and edit a post at the front end without leaving your site. Supports guest posts.

100 active installs v0.9.3 PHP + WP 3.3.1+ Updated Feb 24, 2014
front-endfrontendinsert-postpostquick-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DJD Site Post Safe to Use in 2026?

Generally Safe

Score 85/100

DJD Site Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "djd-site-post" plugin, version 0.9.3, exhibits a mixed security posture. While it has no recorded vulnerabilities and utilizes prepared statements for SQL queries, several concerning code practices are evident. The presence of "create_function" is a significant risk as it is deprecated and can lead to arbitrary code execution if not handled with extreme care. Furthermore, a notable portion of output is not properly escaped, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities, especially when user-supplied data is involved. The plugin also exposes two AJAX handlers without any authentication checks, creating a significant attack surface for unauthorized actions.

The taint analysis, while not revealing critical or high-severity issues, identified two flows with unsanitized paths. This, combined with the unescaped output and unprotected AJAX endpoints, suggests a potential for vulnerabilities where user input could be manipulated to achieve unintended results or compromise data. The absence of nonce checks on AJAX handlers is a missed opportunity to further secure these entry points. In conclusion, the plugin's lack of a vulnerability history is a positive sign, but the identified code quality issues, particularly the unprotected AJAX endpoints and inadequate output escaping, represent tangible security risks that require attention.

Key Concerns

  • AJAX handlers without auth checks
  • Unescaped output
  • Dangerous function: create_function
  • Flows with unsanitized paths
  • Missing nonce checks on AJAX
Vulnerabilities
None known

DJD Site Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DJD Site Post Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
49
18 escaped
Nonce Checks
0
Capability Checks
6
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter( 'teeny_mce_buttons', create_function ( '' , "return array('');" ) , 50 );views\display.php:18
create_functionadd_filter ( 'user_can_richedit' , create_function ( '' , 'return false;' ) , 50 );views\display.php:31
create_functionadd_filter( 'teeny_mce_buttons', create_function ( '' , "return array('');" ) , 50 );views\display.php:38

Output Escaping

27% escaped67 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
process_site_post_form (djd-site-post.php:485)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

DJD Site Post Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_process_site_post_formdjd-site-post.php:61
noprivwp_ajax_process_site_post_formdjd-site-post.php:62

Shortcodes 1

[djd-site-post] djd-site-post.php:87
WordPress Hooks 17
actioninitdjd-site-post.php:41
actionwp_enqueue_scriptsdjd-site-post.php:44
actionwp_enqueue_scriptsdjd-site-post.php:45
actionadmin_initdjd-site-post.php:53
actionadmin_menudjd-site-post.php:54
actioninitdjd-site-post.php:65
actionwidgets_initdjd-site-post.php:71
actionsave_djd_auto_draftdjd-site-post.php:74
filteredit_post_linkdjd-site-post.php:81
filtermedia_view_settingsdjd-site-post.php:294
filtershow_admin_bardjd-site-post.php:350
actionsave_postinc\djdsp-widget.php:21
actiondeleted_postinc\djdsp-widget.php:22
actionswitch_themeinc\djdsp-widget.php:23
filterteeny_mce_buttonsviews\display.php:18
filteruser_can_richeditviews\display.php:31
filterteeny_mce_buttonsviews\display.php:38
Maintenance & Trust

DJD Site Post Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedFeb 24, 2014
PHP min version
Downloads27K

Community Trust

Rating98/100
Number of ratings20
Active installs100
Developer Profile

DJD Site Post Developer Profile

djarzyna

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DJD Site Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/djd-site-post/css/display.css/wp-content/plugins/djd-site-post/js/display.js/wp-content/plugins/djd-site-post/js/script.js
Script Paths
/wp-content/plugins/djd-site-post/js/display.js/wp-content/plugins/djd-site-post/js/script.js
Version Parameters
djd-site-post/css/display.css?ver=djd-site-post/js/display.js?ver=djd-site-post/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
djd-site-post
Data Attributes
djd-site-post
JS Globals
djd_site_post_ajax_object
Shortcode Output
[djd-site-post]
FAQ

Frequently Asked Questions about DJD Site Post