Post CoAuthors Security & Risk Analysis

wordpress.org/plugins/pcauthors

Assign multiple contributors to posts and display them on the frontend. Lightweight and admin-friendly.

0 active installs v1.0 PHP 8.1+ WP 5.0+ Updated Dec 3, 2025
contributorsmultiple-authorsuser-roles
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Post CoAuthors Safe to Use in 2026?

Generally Safe

Score 100/100

Post CoAuthors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'pcauthors' plugin version 1.0 exhibits a strong security posture. The code analysis reveals no dangerous functions, all SQL queries are prepared, and all output is properly escaped. Furthermore, there are no file operations or external HTTP requests, minimizing common attack vectors. The presence of nonce and capability checks, although limited in number, suggests an awareness of security best practices.

The attack surface is remarkably small, with zero identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. Taint analysis shows no identified flows, indicating no readily apparent vulnerabilities related to unsanitized user input being used in sensitive operations. The complete absence of known CVEs and any historical vulnerability records further reinforces this positive assessment.

In conclusion, 'pcauthors' v1.0 appears to be a very secure plugin. Its strengths lie in its minimal attack surface, robust input validation and output sanitization practices evident in the static analysis, and a clean vulnerability history. There are no clear weaknesses or security concerns directly identifiable from the provided data, suggesting it is well-developed from a security perspective.

Vulnerabilities
None known

Post CoAuthors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post CoAuthors Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
13 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped13 total outputs
Attack Surface

Post CoAuthors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadd_meta_boxesincludes\classes\admin\class-pcauthors-admin.php:33
actionsave_postincludes\classes\admin\class-pcauthors-admin.php:34
filterthe_contentincludes\classes\frontend\class-pcauthors-frontend.php:31
actionwp_enqueue_scriptsincludes\classes\frontend\class-pcauthors-frontend.php:32
Maintenance & Trust

Post CoAuthors Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version8.1
Downloads275

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Post CoAuthors Developer Profile

Kajal Gohel

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post CoAuthors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pcauthors/assets/css/pcauthors.css/wp-content/plugins/pcauthors/assets/js/pcauthors.js
Script Paths
/wp-content/plugins/pcauthors/assets/js/pcauthors.js
Version Parameters
pcauthors/style.css?ver=pcauthors/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
pcauthors-boxpcauthors-metaboxpcauthors-list
Data Attributes
name="PcAuthors[]"data-nonce="
Shortcode Output
<div class="pcauthors-box"> <h3>Contributors</h3> <ul>
FAQ

Frequently Asked Questions about Post CoAuthors