Ghost Security & Risk Analysis

wordpress.org/plugins/ghost

Export all your WordPress data to Ghost in a couple of clicks!

600 active installs v1.6.0 PHP + WP 4.2.0+ Updated Nov 15, 2024
bloggingexportghostmigratepublishing
90
A · Safe
CVEs total2
Unpatched0
Last CVEMay 7, 2024
Safety Verdict

Is Ghost Safe to Use in 2026?

Generally Safe

Score 90/100

Ghost has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: May 7, 2024Updated 1yr ago
Risk Assessment

The static analysis of ghost v1.6.0 reveals a seemingly robust security posture with a remarkably small attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the plugin's exposure to common attack vectors. The absence of dangerous functions and the use of prepared statements for all SQL queries are also positive indicators. However, the low percentage of properly escaped output (60%) and the presence of file operations raise minor concerns, as any unescaped output could potentially lead to cross-site scripting (XSS) vulnerabilities. While taint analysis shows no critical or high severity flows, the lack of a more comprehensive taint analysis could mask potential issues.

The vulnerability history for ghost is a significant area of concern. While there are no currently unpatched CVEs, the plugin has a history of two known vulnerabilities, including one high and one medium severity. The common vulnerability types, 'Insertion of Sensitive Information into Log File' and 'Missing Authorization,' are critical flaws that can lead to data breaches and unauthorized access. The fact that the last vulnerability was very recent (May 2024) suggests that these types of issues may persist or re-emerge. The plugin's developer needs to maintain vigilance and ensure thorough code reviews and security testing to prevent future occurrences, especially given the past patterns.

In conclusion, ghost v1.6.0 presents a mixed security profile. Its minimal attack surface and good practices in SQL handling are strengths. However, the concerning vulnerability history, particularly the recent occurrence of authorization and sensitive data leakage issues, coupled with potential for XSS due to insufficient output escaping, necessitates caution. While the current version might not have unpatched critical flaws, the historical context and the identified code signals indicate a need for ongoing security scrutiny and potential improvements in code hardening and testing.

Key Concerns

  • High/Medium severity vulnerabilities in history
  • Recent vulnerability (May 2024)
  • Unsanitized output (40% unescaped)
  • File operations present
  • No nonce checks
  • Limited taint analysis coverage
Vulnerabilities
2

Ghost Security Vulnerabilities

CVEs by Year

1 CVE in 2016
2016
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2024-34559medium · 5.3Insertion of Sensitive Information into Log File

Ghost <= 1.4.0 - Unauthenticated Sensitive Information Exposure

May 7, 2024 Patched in 1.5.0 (9d)
CVE-2016-10983high · 7.5Missing Authorization

Ghost <= 0.5.5 - Missing Authorization Checks

Apr 28, 2016 Patched in 0.5.6 (2826d)
Code Analysis
Analyzed Mar 16, 2026

Ghost Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
12 escaped
Nonce Checks
0
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

60% escaped20 total outputs
Attack Surface

Ghost Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitclass-ghost.php:74
actionadmin_menuclass-ghost.php:77
actionadmin_enqueue_scriptsclass-ghost.php:80
actionadmin_enqueue_scriptsclass-ghost.php:81
actioninitclass-ghost.php:84
actioninitclass-ghost.php:87
actioninitclass-ghost.php:91
filterplugin_action_links_ghost/ghost.phpclass-ghost.php:95
filterintermediate_image_sizesclass-ghost.php:97
Maintenance & Trust

Ghost Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 15, 2024
PHP min version
Downloads43K

Community Trust

Rating72/100
Number of ratings7
Active installs600
Developer Profile

Ghost Developer Profile

JohnONolan

1 plugin · 600 total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
1418 days
View full developer profile
Detection Fingerprints

How We Detect Ghost

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ghost/css/admin.css/wp-content/plugins/ghost/js/admin.js/wp-content/plugins/ghost/css/public.css/wp-content/plugins/ghost/js/public.js
Script Paths
/wp-content/plugins/ghost/js/admin.js/wp-content/plugins/ghost/js/public.js
Version Parameters
ghost/css/admin.css?ver=ghost/js/admin.js?ver=ghost/css/public.css?ver=ghost/js/public.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Ghost