GhostWriter Security & Risk Analysis

wordpress.org/plugins/ghostwriter

Ghostwriter overrides WordPress’s author pages and feeds to emulate the full functionality provided to WordPress users.

10 active installs v1.0 PHP + WP 3.3.2+ Updated Unknown
authorspagespostsusers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GhostWriter Safe to Use in 2026?

Generally Safe

Score 100/100

GhostWriter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "ghostwriter" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The plugin demonstrates excellent adherence to secure coding practices with zero detected dangerous functions, SQL injection vulnerabilities, or external HTTP requests. The absence of any recorded vulnerabilities in its history further reinforces this positive outlook, suggesting a well-maintained and secure codebase. The plugin also implements both nonce and capability checks, which are crucial for protecting against common WordPress attacks.

However, the static analysis does reveal a minor concern regarding output escaping. With 5 total outputs analyzed, only 40% were properly escaped. This indicates a potential weakness where unsanitized data could be outputted to the browser, leading to cross-site scripting (XSS) vulnerabilities. While no taint flows were detected, the unescaped outputs represent a tangible risk that should be addressed. The plugin's limited attack surface and lack of critical code signals are significant strengths, but the output escaping issue is the primary area requiring attention.

In conclusion, "ghostwriter" v1.0 appears to be a secure plugin with a clean history and robust security implementations in most areas. The most notable weakness is the insufficient output escaping. Addressing this single concern would significantly improve the plugin's overall security and reduce the risk of potential XSS exploits. The developers have demonstrated good security practices, and rectifying the output escaping would make it a best-in-class example.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

GhostWriter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GhostWriter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
2 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

40% escaped5 total outputs
Attack Surface

GhostWriter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitghost-writer.php:26
actionafter_setup_themeghost-writer.php:27
actionpre_get_postsghost-writer.php:30
actionadmin_initghost-writer.php:33
actionsave_postghost-writer.php:34
filterposts_whereghost-writer.php:186
actionafter_setup_themeghost-writer.php:441
Maintenance & Trust

GhostWriter Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GhostWriter Developer Profile

Floate Design

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GhostWriter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
fdp_ghost_author_noncefdp_ghost_author_nonce_B73Afdp_ghost_author_listfdp_ghost_author_noncevaluefdp_ghost_author_nonce_B73B
FAQ

Frequently Asked Questions about GhostWriter