Guest Posts Security & Risk Analysis

wordpress.org/plugins/guest-post

This plugin is generally for front-end post submission and providing admin notification.

0 active installs v1.0.0 PHP 7.0+ WP 5.8+ Updated May 23, 2022
custom-post-typefrontend-submission
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Guest Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Guest Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "guest-post" plugin v1.0.0 demonstrates a generally positive security posture based on the provided static analysis. It has a limited attack surface with all identified entry points (AJAX handlers and shortcodes) appearing to have authentication or permission checks. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests are strong indicators of secure coding practices. Furthermore, the presence of nonce and capability checks on the identified entry points further enhances its security.

However, a significant concern arises from the output escaping. With only 33% of the total 12 outputs being properly escaped, there's a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This means that data displayed by the plugin might not be sufficiently sanitized, potentially allowing malicious scripts to be injected and executed in a user's browser. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign. This, combined with the absence of taint analysis findings, suggests that either the plugin is well-developed or has not been subjected to extensive real-world exploitation or advanced security testing. Despite the lack of historical vulnerabilities and apparent secure handling of critical areas like SQL, the inadequate output escaping is a notable weakness that requires immediate attention.

Key Concerns

  • Low percentage of properly escaped outputs
Vulnerabilities
None known

Guest Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Guest Posts Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Guest Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
4 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped12 total outputs
Attack Surface

Guest Posts Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 2

authwp_ajax_gp_post_submissionpublic\submission-handler.php:3
noprivwp_ajax_gp_post_submissionpublic\submission-handler.php:4

Shortcodes 2

[GUEST_POST_FORM] public\init.php:32
[GUEST_POST_LIST] public\init.php:65
WordPress Hooks 4
actioninitadmin\post-types.php:61
actionwp_enqueue_scriptspublic\init.php:10
filterajax_query_attachments_argspublic\init.php:54
actiondraft_guest_postpublic\submission-handler.php:40
Maintenance & Trust

Guest Posts Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.0
Last updatedMay 23, 2022
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Guest Posts Developer Profile

Sunil Kumar Sharma

3 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Guest Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/guest-post/public/assets/css/bootstrap.min.css/wp-content/plugins/guest-post/public/assets/css/guest-post.css/wp-content/plugins/guest-post/public/assets/js/bootstrap.bundle.min.js/wp-content/plugins/guest-post/public/assets/js/guest-post.js
Script Paths
/wp-content/plugins/guest-post/public/assets/js/bootstrap.bundle.min.js/wp-content/plugins/guest-post/public/assets/js/guest-post.js
Version Parameters
guest-post/public/assets/css/bootstrap.min.css?ver=guest-post/public/assets/css/guest-post.css?ver=guest-post/public/assets/js/bootstrap.bundle.min.js?ver=guest-post/public/assets/js/guest-post.js?ver=

HTML / DOM Fingerprints

CSS Classes
alert-warning
JS Globals
gp_vars
Shortcode Output
[GUEST_POST_FORM][GUEST_POST_LIST]
FAQ

Frequently Asked Questions about Guest Posts