The Publisher Desk Security & Risk Analysis

wordpress.org/plugins/the-publisher-desk

Allows for easy integration for any Publisher Desk customer using Wordpress.

10 active installs v1.0.18 PHP + WP 3.0+ Updated Unknown
adsadvertisingmonetization
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is The Publisher Desk Safe to Use in 2026?

Generally Safe

Score 100/100

The Publisher Desk has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plugin "the-publisher-desk" v1.0.18 exhibits a mixed security posture. On the positive side, the plugin demonstrates excellent practices in its handling of SQL queries, exclusively using prepared statements, and a lack of known CVEs or historical vulnerabilities suggests a generally well-maintained codebase in that regard. Furthermore, the static analysis reports a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks.

However, significant concerns arise from the output escaping. 100% of the 6 identified output points are not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the taint analysis revealed one flow with an unsanitized path, which, while not classified as critical or high severity in this instance, still represents a potential weakness. The presence of file operations without further context is also a minor flag. The lack of any nonce checks or capability checks on any potential entry points, though the entry points themselves appear to be zero, should be noted as a potential vulnerability if the attack surface were to expand in future versions or through misconfiguration.

In conclusion, while the plugin has strengths in its SQL handling and a clean vulnerability history, the unescaped output presents a critical risk that could be easily exploited. The taint analysis result, though not severe, also warrants attention. Addressing the output escaping is paramount to improving the security of this plugin.

Key Concerns

  • Unescaped output detected
  • Unsanitized path in taint flow
  • File operations without context
Vulnerabilities
None known

The Publisher Desk Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

The Publisher Desk Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<settings> (templates\settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

The Publisher Desk Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menupublisher-desk.php:281
actioninitpublisher-desk.php:282
actionwp_headpublisher-desk.php:283
actionwp_footerpublisher-desk.php:284
filterthe_contentpublisher-desk.php:289
Maintenance & Trust

The Publisher Desk Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

The Publisher Desk Developer Profile

PublisherDesk

5 plugins · 150 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect The Publisher Desk

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/the-publisher-desk/files/images/favicon.png
Script Paths
//www.googletagservices.com/tag/js/gpt.js//ox-d.publisherdesk.servedbyopenx.com/w/1.0/jstag//s.206ads.com/init.js

HTML / DOM Fingerprints

CSS Classes
tpd-box
HTML Comments
<!-- The Publisher Desk --><!-- / The Publisher Desk --><!-- contextual-ad-* div ids are display none by default -->
Data Attributes
data-tpd-id
JS Globals
window.twoOhSixIdwindow.twoOhSixVersionwindow.twoOhSixCmdtwoOhSix
Shortcode Output
<div id="contextual-a"></div>
FAQ

Frequently Asked Questions about The Publisher Desk