TT Guest Post Submit Security & Risk Analysis

wordpress.org/plugins/tt-guest-post-submit

Submit your post as guest user. Add featured image and other media to the post. Easy to use but very usefull.

60 active installs v4.0 PHP + WP 3.0.1+ Updated Apr 21, 2017
add-postcontent-submissionguest-blogguest-bloggingguest-posting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TT Guest Post Submit Safe to Use in 2026?

Generally Safe

Score 85/100

TT Guest Post Submit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "tt-guest-post-submit" v4.0 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates a commendable approach by exclusively utilizing prepared statements for its SQL queries and avoiding file operations and external HTTP requests. The static analysis also reveals a relatively small attack surface with only one shortcode and no identified AJAX handlers or REST API routes that are unprotected. Furthermore, there is no historical record of known vulnerabilities (CVEs) associated with this plugin, suggesting a history of secure development or diligent patching.

However, significant concerns arise from the lack of robust security checks within the code. The absence of nonce checks and capability checks is a critical oversight. The taint analysis also indicates two flows with unsanitized paths, and while no critical or high severity issues were flagged here, this points to potential vulnerabilities if these flows were to interact with user-controlled input. Additionally, a substantial portion of the plugin's output (56%) is not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities, especially if dynamic content is rendered without proper sanitization.

In conclusion, while the plugin benefits from a clean vulnerability history and secure database practices, the lack of critical security controls like nonce and capability checks, coupled with a high percentage of unescaped output, creates notable risks. The presence of unsanitized paths in the taint analysis, even without immediate critical flagging, further amplifies these concerns. The plugin's overall security can be significantly improved by addressing these implementation weaknesses.

Key Concerns

  • Unescaped output (56%)
  • Missing nonce checks
  • Missing capability checks
  • Taint flows with unsanitized paths (2)
Vulnerabilities
None known

TT Guest Post Submit Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

TT Guest Post Submit Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
31
24 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped55 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
submit_post_function (ttgps-functions.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TT Guest Post Submit Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[tt-submit-post] tt-guest-post-submit.php:249
WordPress Hooks 4
actionadmin_menutt-guest-post-submit.php:27
actionadmin_inittt-guest-post-submit.php:28
actiontemplate_redirecttt-guest-post-submit.php:32
actioninittt-guest-post-submit.php:403
Maintenance & Trust

TT Guest Post Submit Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 21, 2017
PHP min version
Downloads19K

Community Trust

Rating84/100
Number of ratings15
Active installs60
Developer Profile

TT Guest Post Submit Developer Profile

Rashed Latif

4 plugins · 910 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TT Guest Post Submit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tt-guest-post-submit/ttgps-style.css
Version Parameters
tt-guest-post-submit/ttgps-style.css?ver=

HTML / DOM Fingerprints

CSS Classes
tt-generalttgps_options_form_settings_api
Data Attributes
name="ttgps_options_form_settings_api"id="ttgps"name="ttgps_options_form_settings_api"id="ttgps"
Shortcode Output
Shortcode for this plugin: [tt-submit-post]
FAQ

Frequently Asked Questions about TT Guest Post Submit