
Post As Guest Security & Risk Analysis
wordpress.org/plugins/post-as-guestPost as Guest - Creates a form (shortcode) to a page to allow guests to post content.
Is Post As Guest Safe to Use in 2026?
Generally Safe
Score 85/100Post As Guest has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "post-as-guest" plugin v0.9.9 exhibits a mixed security posture. On the positive side, it utilizes prepared statements for all its SQL queries and does not appear to have any recorded vulnerabilities (CVEs). The absence of dangerous functions, file operations, and external HTTP requests is also a positive indicator. However, significant concerns arise from the attack surface analysis. Three out of six total entry points, specifically AJAX handlers, lack authentication checks. This creates a substantial risk of unauthorized access and potential abuse of plugin functionalities by unauthenticated users.
Further code analysis reveals that a significant portion of output (76%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sanitized before being displayed. While taint analysis did not reveal any immediate critical or high-severity flows, the lack of proper output escaping on a large percentage of outputs is a major red flag. The presence of only one nonce check across all entry points further exacerbates the risk associated with the unprotected AJAX handlers.
In conclusion, while the plugin demonstrates good practices in database interaction and has a clean vulnerability history, the unprotected entry points and widespread improper output escaping present considerable security risks. The lack of proper authentication on critical functions and the potential for XSS due to unescaped output are the most pressing issues that require immediate attention. Addressing these weaknesses would significantly improve the plugin's overall security.
Key Concerns
- 3 AJAX handlers without auth checks
- Only 24% of outputs properly escaped
- Only 1 nonce check across all entry points
Post As Guest Security Vulnerabilities
Post As Guest Code Analysis
Output Escaping
Post As Guest Attack Surface
AJAX Handlers 5
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
Post As Guest Maintenance & Trust
Maintenance Signals
Community Trust
Post As Guest Alternatives
WP Dummy Content Generator
wp-dummy-content-generator
Generate realistic dummy content for WordPress quickly. Ideal for developers and designers to populate sites for testing and development.
Related Posts By PickPlugins
related-post
Display Related Post under post by taxonomy and terms.
Auto Affiliate Links
wp-auto-affiliate-links
Automatically display affiliate links in your website content so you can make more money. It is also working well for internal linking.
Carousel Horizontal Posts Content Slider
carousel-horizontal-posts-content-slider
A simple posts content slider, product, images, videos, related posts, custom post type carousel plugin for WordPress.
Koala AI
koala-ai
Koala AI offers a platform of tools for SEOs and content creators.
Post As Guest Developer Profile
6 plugins · 650 total installs
How We Detect Post As Guest
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/post-as-guest/pag.js/wp-content/plugins/post-as-guest/pagfe.jshttps://www.google.com/recaptcha/api.jsHTML / DOM Fingerprints
g-recaptcha<!-- post-as-guest --><!-- /post-as-guest -->data-sitekeyPagAjax/wp-json/<form method="post" id="pag" action=""><input type="hidden" name="action" value="pag_post" /><legend>Title</legend><input type="text" size="50" name="pagtitle" id="pagtitle" />