Post As Guest Security & Risk Analysis

wordpress.org/plugins/post-as-guest

Post as Guest - Creates a form (shortcode) to a page to allow guests to post content.

10 active installs v0.9.9 PHP + WP 4.0+ Updated Mar 26, 2017
contentguestpostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post As Guest Safe to Use in 2026?

Generally Safe

Score 85/100

Post As Guest has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "post-as-guest" plugin v0.9.9 exhibits a mixed security posture. On the positive side, it utilizes prepared statements for all its SQL queries and does not appear to have any recorded vulnerabilities (CVEs). The absence of dangerous functions, file operations, and external HTTP requests is also a positive indicator. However, significant concerns arise from the attack surface analysis. Three out of six total entry points, specifically AJAX handlers, lack authentication checks. This creates a substantial risk of unauthorized access and potential abuse of plugin functionalities by unauthenticated users.

Further code analysis reveals that a significant portion of output (76%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sanitized before being displayed. While taint analysis did not reveal any immediate critical or high-severity flows, the lack of proper output escaping on a large percentage of outputs is a major red flag. The presence of only one nonce check across all entry points further exacerbates the risk associated with the unprotected AJAX handlers.

In conclusion, while the plugin demonstrates good practices in database interaction and has a clean vulnerability history, the unprotected entry points and widespread improper output escaping present considerable security risks. The lack of proper authentication on critical functions and the potential for XSS due to unescaped output are the most pressing issues that require immediate attention. Addressing these weaknesses would significantly improve the plugin's overall security.

Key Concerns

  • 3 AJAX handlers without auth checks
  • Only 24% of outputs properly escaped
  • Only 1 nonce check across all entry points
Vulnerabilities
None known

Post As Guest Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post As Guest Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
7 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

24% escaped29 total outputs
Attack Surface
3 unprotected

Post As Guest Attack Surface

Entry Points6
Unprotected3

AJAX Handlers 5

authwp_ajax_pag_post_previewpost-as-guest.php:146
authwp_ajax_pag_post_removepost-as-guest.php:158
authwp_ajax_pag_post_approvepost-as-guest.php:168
authwp_ajax_pag_postpost-as-guest.php:200
noprivwp_ajax_pag_postpost-as-guest.php:201

Shortcodes 1

[post-as-guest] post-as-guest.php:24
WordPress Hooks 5
actionadmin_menupost-as-guest.php:20
actionadmin_initpost-as-guest.php:21
actionadmin_initpost-as-guest.php:34
actioninitpost-as-guest.php:37
actionwp_enqueue_scriptspost-as-guest.php:56
Maintenance & Trust

Post As Guest Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 26, 2017
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Post As Guest Developer Profile

PowieT

6 plugins · 650 total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
1295 days
View full developer profile
Detection Fingerprints

How We Detect Post As Guest

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-as-guest/pag.js/wp-content/plugins/post-as-guest/pagfe.js
Script Paths
https://www.google.com/recaptcha/api.js

HTML / DOM Fingerprints

CSS Classes
g-recaptcha
HTML Comments
<!-- post-as-guest --><!-- /post-as-guest -->
Data Attributes
data-sitekey
JS Globals
PagAjax
REST Endpoints
/wp-json/
Shortcode Output
<form method="post" id="pag" action=""><input type="hidden" name="action" value="pag_post" /><legend>Title</legend><input type="text" size="50" name="pagtitle" id="pagtitle" />
FAQ

Frequently Asked Questions about Post As Guest