
Per Post Comment Settings Security & Risk Analysis
wordpress.org/plugins/per-post-comment-settingsYou can change comment settings post by post on WP 2.7 or greater.
Is Per Post Comment Settings Safe to Use in 2026?
Generally Safe
Score 85/100Per Post Comment Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "per-post-comment-settings" plugin v0.121 exhibits a strong security posture in several key areas. The static analysis reveals no SQL queries executed without prepared statements, all output is properly escaped, and there are no file operations or external HTTP requests. Furthermore, the plugin demonstrates no known CVEs and has a clean vulnerability history, indicating a history of secure development. The attack surface is also notably absent, with no AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points for external interaction. This absence of known vulnerabilities and minimal attack surface suggests a robustly designed plugin from a security perspective.
However, a significant concern arises from the presence of the `create_function` dangerous function. While the static analysis does not reveal any taint flows or unsanitized paths, the use of `create_function` is generally discouraged in modern PHP due to potential security risks, particularly if it were ever to dynamically construct code based on user input in the future. Additionally, the complete lack of nonce checks and capability checks across any potential entry points (though none are currently present) represents a potential weakness that could be exploited if the plugin's attack surface were to expand in future versions without proper security considerations.
Overall, the plugin is currently in a very secure state with no exploitable vulnerabilities detected in the provided data. The lack of known CVEs and a clean history are strong positives. The main area for improvement lies in refactoring the use of `create_function` and implementing robust authorization checks for any future expansion of its attack surface to maintain this high level of security.
Key Concerns
- Use of dangerous function create_function
- Missing nonce checks
- Missing capability checks
Per Post Comment Settings Security Vulnerabilities
Per Post Comment Settings Release Timeline
Per Post Comment Settings Code Analysis
Dangerous Functions Found
Output Escaping
Per Post Comment Settings Attack Surface
WordPress Hooks 3
Maintenance & Trust
Per Post Comment Settings Maintenance & Trust
Maintenance Signals
Community Trust
Per Post Comment Settings Alternatives
Akismet Anti-spam: Spam Protection
akismet
The best anti-spam protection to block spam comments and spam in a contact form. The most trusted antispam solution for WordPress and WooCommerce.
Disable Comments – Remove Comments & Stop Spam [Multi-Site Support]
disable-comments
Allows administrators to globally disable comments on their site. Comments can be disabled according to post type. Multisite friendly.
Antispam Bee
antispam-bee
Sophisticated antispam plugin for effective daily comment and trackback spam-fighting. Built with data protection and privacy in mind.
Spam protection, Honeypot, Anti-Spam by CleanTalk
cleantalk-spam-protect
Blocks spam comments, fake users, contact form spam and more. No impact on SEO. Privacy focused. CAPTCHA free, premium Antispam plugin.
Captcha Code
captcha-code-authentication
GDPR compatible captcha anti-spam protection for login form, comments form, registration form & lost password form. Eliminate spam with captcha.
Per Post Comment Settings Developer Profile
2 plugins · 610 total installs
How We Detect Per Post Comment Settings
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/per-post-comment-settings/css/style.css/wp-content/plugins/per-post-comment-settings/js/scripts.js/wp-content/plugins/per-post-comment-settings/js/scripts.jsper-post-comment-settings/css/style.css?ver=per-post-comment-settings/js/scripts.js?ver=HTML / DOM Fingerprints
<!-- ppcs -->data-ppcs-comment-registrationdata-ppcs-close-comments-for-old-postsdata-ppcs-close-comments-days-olddata-ppcs-thread-commentsdata-ppcs-thread-comments-depthdata-ppcs-page-comments+3 morewp_ppcs_settings