ST Insert Post Security & Risk Analysis

wordpress.org/plugins/st-insert-post-plugin

A simple front end post form for all users, and as a bonus the ability to list subpages.

10 active installs v1.0.3 PHP + WP 3.0+ Updated Oct 6, 2011
adminformfront-endpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ST Insert Post Safe to Use in 2026?

Generally Safe

Score 85/100

ST Insert Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The st-insert-post-plugin v1.0.3 exhibits a strong security posture based on the provided static analysis. The complete absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and a lack of critical or high severity taint flows are excellent indicators of secure coding practices. Furthermore, the plugin's vulnerability history is clean, with no recorded CVEs, suggesting a well-maintained and secure codebase over time.

However, there are some areas that warrant attention. The plugin has two shortcodes, which represent entry points into the plugin's functionality. While the static analysis indicates no authentication or permission checks are associated with these entry points, and no unsanitized taint flows were found, the presence of entry points without explicit security checks is a potential concern. The absence of nonce checks and capability checks, as reported, could be a weakness if the shortcodes perform any sensitive operations or if they can be leveraged in conjunction with other vulnerabilities to execute actions without proper authorization. Despite these minor concerns, the overall security of this plugin appears to be good, with a strong emphasis on secure coding standards and a clean vulnerability history.

Key Concerns

  • Shortcodes without capability checks
  • Shortcodes without nonce checks
Vulnerabilities
None known

ST Insert Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

ST Insert Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

ST Insert Post Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[st_insert_post] st-insert-post.php:107
[stls] st-insert-post.php:165
WordPress Hooks 1
filterwidget_textst-insert-post.php:14
Maintenance & Trust

ST Insert Post Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 6, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ST Insert Post Developer Profile

shayne

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ST Insert Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/st-insert-post-plugin/css/style.css
Version Parameters
st-insert-post-plugin/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
st-insert-poststip-formstip-boxstip-labelstip-errorstip-successstls_list
Data Attributes
name="category"name="title"name="content"name="save"id="stip-message"class="stip-error"+2 more
JS Globals
javascript:history.go(-1)location.href
Shortcode Output
[st_insert_post][stls]
FAQ

Frequently Asked Questions about ST Insert Post