EmbedTweet Security & Risk Analysis

wordpress.org/plugins/embedtweet

EmbedTweet makes embedding tweets in your posts a easy. Just link to a tweet and it will automatically turn into an embedded, fully interactive tweet.

10 active installs v1.0.0 PHP + WP + Updated Jul 26, 2011
embedembeddingtweettweetstwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EmbedTweet Safe to Use in 2026?

Generally Safe

Score 85/100

EmbedTweet has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The static analysis of the "embedtweet" v1.0.0 plugin reveals a generally strong security posture, with no identified vulnerabilities in SQL queries, output escaping, file operations, or external HTTP requests. The absence of known CVEs and a clean vulnerability history further contribute to this positive assessment, suggesting a well-maintained and secure plugin.

However, the presence of the `create_function` dangerous function is a significant concern. While the static analysis didn't identify any taint flows that exploit this, it represents a known security risk that could potentially be leveraged if user input is incorporated into its execution context. Additionally, the complete lack of nonce checks and capability checks across all potential entry points (though currently zero) indicates a reliance on WordPress's core handling of these aspects. Should any new entry points be introduced in future versions without these security measures, the plugin could become vulnerable to CSRF or unauthorized actions.

In conclusion, while "embedtweet" v1.0.0 demonstrates good practices in many areas and has no known historical vulnerabilities, the single dangerous function and the absence of explicit security checks on potential entry points warrant careful monitoring. The plugin's current minimal attack surface is a strength, but the potential for future issues due to the identified code signal is a weakness.

Key Concerns

  • Use of dangerous function create_function
  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
Vulnerabilities
None known

EmbedTweet Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EmbedTweet Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$content = preg_replace_callback($regex, create_function(index.php:48
Attack Surface

EmbedTweet Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitindex.php:75
filterthe_contentindex.php:76
Maintenance & Trust

EmbedTweet Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJul 26, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

EmbedTweet Developer Profile

marckohlbrugge

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EmbedTweet

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/embedtweet/javascripts/embed_v2.js/wp-content/plugins/embedtweet/stylesheets/embed_v2.css
Script Paths
http://embedtweet.com/javascripts/embed_v2.js

HTML / DOM Fingerprints

HTML Comments
todo: Make the stylesheet customizable in wp-admin.
Shortcode Output
<a href="$tweet_link"><strong>$author</strong> tweeted:</a><blockquote>$text</blockquote>
FAQ

Frequently Asked Questions about EmbedTweet