Any User Twitter Feed Security & Risk Analysis

wordpress.org/plugins/any-user-twitter-feed

Embed anyone's Twitter Timeline using only their username, or display tweets based on a keyword. Fully compatible with the latest Twitter API and …

200 active installs v1.0 PHP + WP 3.5+ Updated Jan 17, 2016
searchtwittertwitter-searchtwitter-sidebartwitter-timeline
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Any User Twitter Feed Safe to Use in 2026?

Generally Safe

Score 85/100

Any User Twitter Feed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "any-user-twitter-feed" plugin v1.0 exhibits a mixed security posture. While it boasts a completely clean vulnerability history with no known CVEs, this is overshadowed by several concerning code signals. The presence of `create_function` and `unserialize` are significant red flags, as these functions can be exploited for remote code execution if user-supplied data is passed to them without proper sanitization. The extremely low percentage of properly escaped output (12%) indicates a high risk of cross-site scripting (XSS) vulnerabilities across numerous output points. Furthermore, the complete absence of nonce checks and capability checks, coupled with a zero attack surface revealed by the static analysis, suggests a lack of robust input validation and authorization mechanisms. This could be either a testament to the limited functionality of the plugin or a sign that its entry points are not being effectively discovered. The lack of historical vulnerabilities might be attributed to its limited usage or prior development efforts that were not thoroughly audited. However, the current code signals present substantial inherent risks that require immediate attention, particularly the potential for RCE and widespread XSS.

Key Concerns

  • Presence of 'create_function'
  • Presence of 'unserialize'
  • Low output escaping rate (12%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Any User Twitter Feed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Any User Twitter Feed Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
36
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("AnyUserTwitterFeed");'));any-user-twitter-feed.php:263
unserializereturn unserialize($cache);helper.php:116

Output Escaping

12% escaped41 total outputs
Attack Surface

Any User Twitter Feed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initany-user-twitter-feed.php:263
actionadmin_enqueue_scriptsany-user-twitter-feed.php:265
Maintenance & Trust

Any User Twitter Feed Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedJan 17, 2016
PHP min version
Downloads19K

Community Trust

Rating100/100
Number of ratings17
Active installs200
Developer Profile

Any User Twitter Feed Developer Profile

sellersbay

2 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Any User Twitter Feed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
any-user-twitter-feed-widget
HTML Comments
<!-- Twitter Widget -->
Data Attributes
data-usernamedata-querydata-widget-titledata-link-titledata-countdata-width+16 more
JS Globals
anyUserTwitterFeed
Shortcode Output
[any_user_twitter_feed
FAQ

Frequently Asked Questions about Any User Twitter Feed