eewee flattr Security & Risk Analysis

wordpress.org/plugins/eewee-flattr

Use the system "flattr" wordrpess on your site.

10 active installs v1.1 PHP + WP 3.1+ Updated Sep 5, 2014
donateflattrmicropaymentspeople-share-money
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is eewee flattr Safe to Use in 2026?

Generally Safe

Score 85/100

eewee flattr has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "eewee-flattr" plugin v1.1 exhibits a mixed security posture. On the positive side, there are no known historical vulnerabilities (CVEs), and the plugin does not perform file operations, external HTTP requests, or use bundled libraries. All SQL queries are properly prepared, which is a significant strength.

However, several concerning signals emerge from the static analysis. The plugin has a shortcode as an entry point, and critically, none of the entry points have authentication or capability checks. This means any user, regardless of their role, can interact with the shortcode. Furthermore, the taint analysis reveals a flow with an unsanitized path, indicating a potential for input manipulation that could lead to unexpected behavior or security issues, even if no critical or high severity vulnerabilities were identified in this specific flow. The most significant weakness is that 100% of output is not properly escaped, posing a substantial Cross-Site Scripting (XSS) risk. While there are no known CVEs, this lack of output escaping is a fundamental security flaw.

In conclusion, while the absence of historical vulnerabilities and the use of prepared SQL statements are commendable, the lack of authentication on entry points and the pervasive issue of unescaped output create significant security risks. The plugin has a low attack surface, but the existing weaknesses could be exploited if an attacker finds a way to leverage the unsanitized path or inject malicious scripts through the unescaped output.

Key Concerns

  • Unescaped output
  • Unprotected entry points
  • Flow with unsanitized paths
Vulnerabilities
None known

eewee flattr Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

eewee flattr Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<flattr> (view\flattr.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

eewee flattr Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[flattr-widget] controllers\EeweeFlattr.php:9
WordPress Hooks 4
actionadmin_initcontrollers\EeweeFlattr.php:40
actioninitindex.php:28
actioninitindex.php:37
actionadmin_menuindex.php:73
Maintenance & Trust

eewee flattr Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 5, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

eewee flattr Developer Profile

eewee

5 plugins · 50 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect eewee flattr

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eewee_flattr/css/style.css

HTML / DOM Fingerprints

Data Attributes
data-flattr-uiddata-flattr-button
Shortcode Output
<iframe src="http://tools.flattr.net/widgets/thing.html?thing=" width="" height=""></iframe>
FAQ

Frequently Asked Questions about eewee flattr