Guest Posting Security & Risk Analysis

wordpress.org/plugins/guest-posting

Allows users to submit guest posts.

0 active installs v1.0.0 PHP + WP 5.0+ Updated Jan 24, 2025
blogcontent-submissionguest-authorguest-postingsubmissions
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Guest Posting Safe to Use in 2026?

Generally Safe

Score 92/100

Guest Posting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'guest-posting' plugin version 1.0.0 demonstrates a strong security posture based on the provided static analysis. There are no identified dangerous functions, SQL queries are all prepared, and output is properly escaped. The plugin also implements nonce checks, which is a positive security practice. The lack of file operations and external HTTP requests further reduces potential attack vectors. The absence of any recorded vulnerabilities in its history suggests a history of secure development or minimal exposure to attack.

While the static analysis reveals no immediate critical flaws, the 'capability checks: 0' is a significant concern. This means that even though there are entry points (specifically a shortcode), there are no checks to ensure that only authorized users can trigger them. This could lead to privilege escalation or unauthorized actions if the shortcode's functionality is sensitive. The vulnerability history being completely clean is a positive indicator, but it does not negate the potential risk identified by the missing capability checks.

In conclusion, the plugin has several good security practices in place. However, the complete absence of capability checks on its entry points presents a notable weakness that could be exploited. A clean vulnerability history is encouraging, but the current analysis indicates a specific area for improvement to ensure robust security.

Key Concerns

  • Missing capability checks on entry points
Vulnerabilities
None known

Guest Posting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Guest Posting Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Guest Posting Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped8 total outputs
Attack Surface

Guest Posting Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[bdp_guest_posting_form] guest-posting.php:89
WordPress Hooks 2
actionadmin_post_nopriv_bdp_guest_posting_submissionguest-posting.php:50
actionadmin_post_bdp_guest_posting_submissionguest-posting.php:51
Maintenance & Trust

Guest Posting Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 24, 2025
PHP min version
Downloads509

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Guest Posting Developer Profile

Keven

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Guest Posting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="bdp_guest_posting_nonce"value="bdp_guest_posting_form"name="action"value="bdp_guest_posting_submission"name="post_title"name="post_content"+1 more
Shortcode Output
<p>Thank you for your submission! Your post is under review.</p><p>There was an error with your submission. Please try again.</p><form method="post" action="<label for="post_title">Post Title:</label>
FAQ

Frequently Asked Questions about Guest Posting