Post Switch Security & Risk Analysis

wordpress.org/plugins/post-switch

Post Switch allows you to switch your editing post right in your admin post edit panel

10 active installs v1.0 PHP + WP 3.1+ Updated Oct 21, 2012
adminedit
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Switch Safe to Use in 2026?

Generally Safe

Score 85/100

Post Switch has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'post-switch' v1.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, performing no file operations or external HTTP requests, and using prepared statements for all SQL queries. Its vulnerability history is clean, with no recorded CVEs, suggesting a generally well-maintained codebase in the past. However, significant security concerns arise from its static analysis. The plugin exposes one AJAX handler that lacks any authentication checks, creating a direct entry point for unauthenticated users. Furthermore, there are no nonce checks or capability checks implemented, leaving the AJAX handler vulnerable to potential unauthorized actions or information disclosure. The limited output escaping is also a concern, with only 25% of outputs properly escaped, increasing the risk of cross-site scripting (XSS) vulnerabilities. The lack of taint analysis data could also indicate a limited scope of testing or that the analysis tool did not identify any flows, which doesn't necessarily mean a lack of vulnerabilities. In conclusion, while the absence of known vulnerabilities and reliance on prepared statements are strengths, the unprotected AJAX endpoint and insufficient input/output validation are critical weaknesses that require immediate attention.

Key Concerns

  • AJAX handler without auth checks
  • 0 Nonce checks
  • 0 Capability checks
  • Only 25% output escaping
Vulnerabilities
None known

Post Switch Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Post Switch Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped4 total outputs
Attack Surface
1 unprotected

Post Switch Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_get_posts_dropdown_listpost-switch.php:167
WordPress Hooks 1
actionadd_meta_boxespost-switch.php:26
Maintenance & Trust

Post Switch Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedOct 21, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Switch Developer Profile

chaozh

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Switch

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-switch/js/postswitch.js
Script Paths
/wp-content/plugins/post-switch/js/postswitch.js
Version Parameters
post-switch/js/postswitch.js?ver=

HTML / DOM Fingerprints

CSS Classes
post-switch-categoriesmisc-pub-section
Data Attributes
id="categories-dropdown"id="posts-dropdown"
JS Globals
window.get_posts_dropdown_list
REST Endpoints
/wp-json/post-switch/v1/get_posts_dropdown_list
FAQ

Frequently Asked Questions about Post Switch