Writing On GitHub Security & Risk Analysis

wordpress.org/plugins/writing-on-github

A WordPress plugin to allow you writing on GitHub (or Jekyll site).

10 active installs v1.11 PHP + WP 3.9+ Updated Unknown
collaborationcontentgitgithubversion-control
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Writing On GitHub Safe to Use in 2026?

Generally Safe

Score 100/100

Writing On GitHub has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "writing-on-github" plugin v1.11 presents a mixed security posture. On the positive side, the plugin demonstrates strong security practices in several areas. It avoids dangerous functions, all SQL queries are properly prepared, and a high percentage of outputs are escaped, indicating a good awareness of common web vulnerabilities. Furthermore, the absence of any recorded vulnerabilities or CVEs in its history is a significant positive indicator of its security over time.

However, the static analysis reveals a critical weakness. The plugin exposes a single AJAX handler that lacks any authentication or capability checks. This unprotected entry point is a significant security concern, as it could be leveraged by unauthenticated users to interact with the plugin in unintended ways, potentially leading to various attacks depending on the handler's functionality. The absence of taint analysis results and a lack of known vulnerabilities do not negate this specific, identified risk.

In conclusion, while the plugin's developers have implemented good security practices in many aspects of the code, the unprotected AJAX handler represents a serious oversight. This single vulnerability dramatically increases the plugin's risk profile, outweighing the positive aspects of its security history and coding standards. Remediation of this unprotected endpoint should be the top priority.

Key Concerns

  • AJAX handler without authentication/capability checks
Vulnerabilities
None known

Writing On GitHub Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Writing On GitHub Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
34 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

89% escaped38 total outputs
Attack Surface
1 unprotected

Writing On GitHub Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

noprivwp_ajax_wogh_push_requestwriting-on-github.php:133
WordPress Hooks 9
actionplugins_loadedwriting-on-github.php:20
actionadmin_noticeswriting-on-github.php:126
actioninitwriting-on-github.php:128
actionsave_postwriting-on-github.php:131
actiondelete_postwriting-on-github.php:132
actionwogh_exportwriting-on-github.php:134
actionwogh_importwriting-on-github.php:135
filterget_edit_post_linkwriting-on-github.php:136
filterthe_contentwriting-on-github.php:140
Maintenance & Trust

Writing On GitHub Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating94/100
Number of ratings3
Active installs10
Developer Profile

Writing On GitHub Developer Profile

litefeel

4 plugins · 60 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Writing On GitHub

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/writing-on-github/assets/css/style.css/wp-content/plugins/writing-on-github/assets/js/script.js
Script Paths
/wp-content/plugins/writing-on-github/assets/js/script.js
Version Parameters
writing-on-github/assets/css/style.css?ver=writing-on-github/assets/js/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-wogh-post-id
JS Globals
WritingOnGithub
REST Endpoints
/wp-json/writing-on-github/v1/posts
FAQ

Frequently Asked Questions about Writing On GitHub