SP Authors Security & Risk Analysis

wordpress.org/plugins/sp-authors

This very simple plugin allows multiple authors to be assigned to a Post or Page.

10 active installs v1.0 PHP + WP 2.6+ Updated Dec 2, 2009
authorscoauthorsmultiple-authors
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SP Authors Safe to Use in 2026?

Generally Safe

Score 85/100

SP Authors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "sp-authors" v1.0 plugin exhibits a concerning security posture despite its limited attack surface and lack of recorded vulnerabilities. The static analysis reveals significant weaknesses in core security practices. Notably, all SQL queries are executed without the use of prepared statements, opening the door to SQL injection vulnerabilities. Furthermore, none of the identified output operations are properly escaped, which could lead to cross-site scripting (XSS) flaws if user-supplied data is ever incorporated into these outputs. The absence of nonce checks and capability checks on any potential entry points, though currently few, represents a critical gap in authorization and validation, making the plugin susceptible to unauthorized actions if its attack surface expands or if vulnerabilities are introduced in the future. The clean vulnerability history is a positive indicator, but it does not negate the inherent risks present in the current codebase's insecure coding practices. Without addressing the unescaped output and raw SQL queries, the plugin remains vulnerable, and its security posture should be considered poor.

Key Concerns

  • SQL queries do not use prepared statements
  • Output escaping is not implemented
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

SP Authors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SP Authors Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

0% escaped5 total outputs
Attack Surface

SP Authors Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[sp-authors] sp-authors.php:227
WordPress Hooks 9
actionadmin_print_scripts-post.phpsp-authors.php:31
actionadmin_print_scripts-page.phpsp-authors.php:32
actionadmin_print_scripts-post-new.phpsp-authors.php:33
actionadmin_print_scripts-page-new.phpsp-authors.php:34
actionadmin_menusp-authors.php:95
actionsave_postsp-authors.php:101
actionsave_pagesp-authors.php:102
filterposts_joinsp-authors.php:242
filterposts_wheresp-authors.php:252
Maintenance & Trust

SP Authors Maintenance & Trust

Maintenance Signals

WordPress version tested2.8
Last updatedDec 2, 2009
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SP Authors Developer Profile

leticia

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SP Authors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sp-authors/sp-authors.js
Script Paths
/wp-content/plugins/sp-authors/sp-authors.js

HTML / DOM Fingerprints

CSS Classes
button
Data Attributes
id="wp-authors-submit"name="_sp_authors"id="_sp_authors"
Shortcode Output
[sp-authors]
FAQ

Frequently Asked Questions about SP Authors