Custom Strava Integration Security & Risk Analysis

wordpress.org/plugins/custom-strava-integration

This plugin provides an easy way to add your strava activities to your posts without leaving your site.

20 active installs v1.0 PHP + WP 3.4+ Updated Sep 30, 2015
bikingrunningshortcodestrava
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Strava Integration Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Strava Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The custom-strava-integration plugin v1.0 exhibits a concerning security posture due to several critical weaknesses. While it correctly avoids dangerous functions, raw SQL queries, and external HTTP requests, its primary vulnerabilities lie in its handling of entry points. The presence of two unprotected AJAX handlers presents a significant attack surface, as attackers could potentially trigger these without proper authentication. Furthermore, the complete lack of output escaping across all observed outputs is a severe deficiency, opening the door to Cross-Site Scripting (XSS) vulnerabilities.

The taint analysis, despite not identifying critical or high severity flows, is limited by the lack of auth checks and proper escaping. The "flows with unsanitized paths" is concerning, suggesting that user-supplied data is being used in a way that could lead to vulnerabilities if the entry points were properly secured. The vulnerability history shows no recorded CVEs, which is a positive sign, but this cannot be relied upon given the other identified weaknesses. A clean history does not inherently mean a plugin is secure, especially when significant security gaps are present in the code itself.

In conclusion, the plugin's reliance on unprotected AJAX handlers and the complete absence of output escaping are major security risks that overshadow the absence of known CVEs. The plugin is not recommended for production use without significant remediation of these issues. The use of prepared statements for SQL and lack of file operations are good practices, but they do not mitigate the immediate threats posed by the identified attack vectors and output handling.

Key Concerns

  • Unprotected AJAX handlers
  • Output escaping missing
  • No nonce checks
  • No capability checks
  • Unsanitized paths in taint analysis
Vulnerabilities
None known

Custom Strava Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Strava Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped12 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
strava_next (custom-strava-integration-metabox.php:165)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Custom Strava Integration Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_nextcustom-strava-integration-metabox.php:8
authwp_ajax_prevcustom-strava-integration-metabox.php:9

Shortcodes 1

[strava] custom-strava-integration-shortcode.php:5
WordPress Hooks 5
actionadmin_menucustom-strava-integration-admin.php:11
actionadmin_initcustom-strava-integration-admin.php:55
actionload-post.phpcustom-strava-integration-metabox.php:5
actionload-post-new.phpcustom-strava-integration-metabox.php:6
actionadd_meta_boxescustom-strava-integration-metabox.php:12
Maintenance & Trust

Custom Strava Integration Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 30, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Custom Strava Integration Developer Profile

floriankimmel

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Strava Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
activity-detailstrava-distancestrava-elevationstrava-timestrava-namestrava-locationmodalsearch-result+5 more
Data Attributes
id="strava-loading"id="strava-content"id="result-link-data-strava-id="
JS Globals
strava_for_wordpress_meta_box_setupstrava_for_wordpress_meta_boxstrava_for_wordpress_meta_box_displayprint_resultstrava_nextstrava_prev+10 more
REST Endpoints
/wp-json/strava/v1/activities
Shortcode Output
[strava id="
FAQ

Frequently Asked Questions about Custom Strava Integration