jQuery Post Splitter Security & Risk Analysis

wordpress.org/plugins/jquery-post-splitter

This plugin will split your post and pages into multiple pages with a tag. A button to split the pages and posts is available in text editor icons.

100 active installs v3.0.5 PHP 7.0+ WP 4.0+ Updated Oct 22, 2025
ajax-postsnext-pagepaged-postspost-splittersplitter-auto-loading
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is jQuery Post Splitter Safe to Use in 2026?

Generally Safe

Score 100/100

jQuery Post Splitter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The 'jquery-post-splitter' plugin v3.0.5 exhibits a generally positive security posture, adhering to several best practices. The complete absence of known CVEs, along with the exclusive use of prepared statements for SQL queries, indicates a mature development process and a focus on preventing common database vulnerabilities. Furthermore, the presence of nonce and capability checks on all identified AJAX entry points is commendable, significantly reducing the risk of unauthorized actions. The plugin also avoids potentially risky operations like file modifications or external HTTP requests.

However, a notable area for improvement lies in output escaping. With only 21% of outputs properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. While no critical or high-severity taint flows were identified in the static analysis, the unsanitized path flow requires attention as it could potentially lead to vulnerabilities if exploited in conjunction with unescaped output. The limited attack surface is a positive factor, but the low percentage of properly escaped outputs remains the primary concern and warrants remediation.

In conclusion, 'jquery-post-splitter' v3.0.5 demonstrates a strong foundation by securing its entry points and database interactions. The lack of historical vulnerabilities further reinforces this. The most critical weakness is the insufficient output escaping, which presents a tangible risk that outweighs the generally good practices elsewhere. Addressing this would elevate the plugin's security to a much more robust level.

Key Concerns

  • Insufficient output escaping detected.
  • Taint flow with unsanitized path identified.
Vulnerabilities
None known

jQuery Post Splitter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

jQuery Post Splitter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
73
19 escaped
Nonce Checks
8
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

21% escaped92 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

5 flows1 with unsanitized paths
jps_navigation_styling_html (inc\jps-functions-inner.php:218)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

jQuery Post Splitter Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_jps_save_post_metainc\jps-core-admin.php:434
authwp_ajax_jps_clear_page_breakinc\jps-functions-inner.php:170
authwp_ajax_jps_get_navigation_style_htmlinc\jps-functions-inner.php:550
WordPress Hooks 19
actionadmin_menuinc\functions-essentials.php:29
actionadmin_initinc\jps-core-admin.php:34
actionadd_meta_boxesinc\jps-core-admin.php:68
actionsave_postinc\jps-core-admin.php:505
actionwp_headinc\jps-core-front.php:283
actionwp_footerinc\jps-core-front.php:284
actioninitinc\jps-core-front.php:964
actioninitinc\jps-functions-inner.php:595
actioninitinc\jps-functions-inner.php:646
filtermce_external_pluginsinc\split-buttons.php:14
filtermce_buttonsinc\split-buttons.php:15
actionadmin_initinc\split-buttons.php:20
filtermce_buttonsindex.php:191
filterplugin_row_metaindex.php:193
actionadmin_enqueue_scriptsindex.php:194
filterwp_link_pages_argsindex.php:206
filterthe_contentindex.php:211
actionwp_enqueue_scriptsindex.php:215
actionwpindex.php:217
Maintenance & Trust

jQuery Post Splitter Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 22, 2025
PHP min version7.0
Downloads42K

Community Trust

Rating92/100
Number of ratings37
Active installs100
Developer Profile

jQuery Post Splitter Developer Profile

Fahad Mahmood

40 plugins · 33K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
237 days
View full developer profile
Detection Fingerprints

How We Detect jQuery Post Splitter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jquery-post-splitter/css/jps-admin.css/wp-content/plugins/jquery-post-splitter/js/jps-admin.js/wp-content/plugins/jquery-post-splitter/js/jps-front.js
Script Paths
/wp-content/plugins/jquery-post-splitter/js/jps-admin.js
Version Parameters
jquery-post-splitter/css/jps-admin.css?t=jquery-post-splitter/js/jps-admin.js?t=jquery-post-splitter/js/jps-front.js?ver=

HTML / DOM Fingerprints

CSS Classes
jps-nextjps-prevjps-pro-feature
HTML Comments
<!-- Premium Feature --><!-- Add a nonce field so we can check for it later. --><!-- Use get_post_meta() to retrieve an existing value --><!-- from the database and use the value for the form. -->
Data Attributes
jps_meta_box_nonce
FAQ

Frequently Asked Questions about jQuery Post Splitter