vWriter Guest Post Security & Risk Analysis

wordpress.org/plugins/vwriter-guest-post

This guest post plugin turns guest posting on its head, giving you an easy and hassle-free way to use the powerful content marketing strategy.

10 active installs v1.0 PHP + WP 3.0+ Updated Nov 15, 2013
guest-blogguest-bloggingguest-postguest-postingguest-posts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is vWriter Guest Post Safe to Use in 2026?

Generally Safe

Score 85/100

vWriter Guest Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "vwriter-guest-post" v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, external HTTP requests, file operations, and SQL queries not using prepared statements are excellent indicators of secure coding practices. Furthermore, the presence of nonce and capability checks, even on its limited entry points, demonstrates a commitment to protecting against common WordPress vulnerabilities. The plugin also has a clean vulnerability history with no known CVEs, which suggests a stable and well-maintained codebase.

However, a significant concern arises from the output escaping analysis, where only 20% of the total 5 outputs are properly escaped. This leaves 80% of the plugin's output potentially vulnerable to Cross-Site Scripting (XSS) attacks. If user-supplied data is outputted without proper sanitization or escaping, an attacker could inject malicious scripts that execute in the context of a user's browser. The plugin's single shortcode represents the primary avenue for this risk, and its interaction with unsanitized data needs careful scrutiny.

In conclusion, while the plugin has foundational security strengths, the low percentage of properly escaped output is a critical weakness that requires immediate attention. The limited attack surface is a positive, but the potential for XSS through improperly handled output on its shortcode is the most significant risk identified. Addressing the output escaping issues should be the top priority to mitigate this vulnerability.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

vWriter Guest Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

vWriter Guest Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
1 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped5 total outputs
Attack Surface

vWriter Guest Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[vwriter_guest_post] inc\frontend.php:23
WordPress Hooks 8
actionadmin_enqueue_scriptsinc\admin.php:12
actionadmin_initinc\admin.php:15
actionadmin_menuinc\admin.php:18
actionwp_enqueue_scriptsinc\frontend.php:17
filterthe_contentinc\frontend.php:20
actioninitvwriter-guest-post.php:212
actionadd_meta_boxesvwriter-guest-post.php:222
actionsave_postvwriter-guest-post.php:316
Maintenance & Trust

vWriter Guest Post Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedNov 15, 2013
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

vWriter Guest Post Developer Profile

takanomi

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect vWriter Guest Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vwriter-guest-post/css/post-footer-admin.css/wp-content/plugins/vwriter-guest-post/js/post-footer.js
Script Paths
/wp-content/plugins/vwriter-guest-post/js/post-footer.js
Version Parameters
vwriter-guest-post/css/post-footer-admin.css?ver=vwriter-guest-post/js/post-footer.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about vWriter Guest Post