
TT Guest Post Submit Security & Risk Analysis
wordpress.org/plugins/tt-guest-post-submitSubmit your post as guest user. Add featured image and other media to the post. Easy to use but very usefull.
Is TT Guest Post Submit Safe to Use in 2026?
Generally Safe
Score 85/100TT Guest Post Submit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "tt-guest-post-submit" v4.0 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates a commendable approach by exclusively utilizing prepared statements for its SQL queries and avoiding file operations and external HTTP requests. The static analysis also reveals a relatively small attack surface with only one shortcode and no identified AJAX handlers or REST API routes that are unprotected. Furthermore, there is no historical record of known vulnerabilities (CVEs) associated with this plugin, suggesting a history of secure development or diligent patching.
However, significant concerns arise from the lack of robust security checks within the code. The absence of nonce checks and capability checks is a critical oversight. The taint analysis also indicates two flows with unsanitized paths, and while no critical or high severity issues were flagged here, this points to potential vulnerabilities if these flows were to interact with user-controlled input. Additionally, a substantial portion of the plugin's output (56%) is not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities, especially if dynamic content is rendered without proper sanitization.
In conclusion, while the plugin benefits from a clean vulnerability history and secure database practices, the lack of critical security controls like nonce and capability checks, coupled with a high percentage of unescaped output, creates notable risks. The presence of unsanitized paths in the taint analysis, even without immediate critical flagging, further amplifies these concerns. The plugin's overall security can be significantly improved by addressing these implementation weaknesses.
Key Concerns
- Unescaped output (56%)
- Missing nonce checks
- Missing capability checks
- Taint flows with unsanitized paths (2)
TT Guest Post Submit Security Vulnerabilities
TT Guest Post Submit Code Analysis
Output Escaping
Data Flow Analysis
TT Guest Post Submit Attack Surface
Shortcodes 1
WordPress Hooks 4
Maintenance & Trust
TT Guest Post Submit Maintenance & Trust
Maintenance Signals
Community Trust
TT Guest Post Submit Alternatives
vWriter Guest Post
vwriter-guest-post
This guest post plugin turns guest posting on its head, giving you an easy and hassle-free way to use the powerful content marketing strategy.
Guest Posting
guest-posting
Allows users to submit guest posts.
Sitemap by BestWebSoft – WordPress XML Site Map Page Generator Plugin
google-sitemap-plugin
Generate and add XML sitemap to WordPress website. Help search engines index your blog.
Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
frontend-post-submission-manager-lite
Frontend Post Submission with or without Login, 5 PreDesigned Form Templates, Add Unlimited Custom Fields, Google Captcha Security, Post Notifications
Post to CSV by BestWebSoft
post-to-csv
Export WordPress posts to CSV file format easily. Configure data order.
TT Guest Post Submit Developer Profile
4 plugins · 910 total installs
How We Detect TT Guest Post Submit
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/tt-guest-post-submit/ttgps-style.csstt-guest-post-submit/ttgps-style.css?ver=HTML / DOM Fingerprints
tt-generalttgps_options_form_settings_apiname="ttgps_options_form_settings_api"id="ttgps"name="ttgps_options_form_settings_api"id="ttgps"Shortcode for this plugin: [tt-submit-post]