Hashtag Security & Risk Analysis

wordpress.org/plugins/hashtag

Use hashtag on WordPress just like on Twitter or Facebook. Word preceded with hash automatically converted into clickable link.

200 active installs v0.5 PHP + WP 3.0+ Updated Jan 26, 2016
facebookhashtagsearchtwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hashtag Safe to Use in 2026?

Generally Safe

Score 85/100

Hashtag has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "hashtag" plugin v0.5 presents a mixed security posture. On the positive side, there are no reported vulnerabilities, no dangerous functions, no direct SQL queries (all are prepared), no file operations, and no external HTTP requests, suggesting a generally cautious approach to potentially risky coding practices. The absence of a large attack surface is also a strength.

However, significant concerns arise from the static code analysis. With 13 total output operations, only 31% are properly escaped, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities where user-supplied data could be rendered without proper sanitization. Furthermore, the taint analysis revealed 2 flows with unsanitized paths, which, while not classified as critical or high severity, still represent potential avenues for attackers to inject malicious code or manipulate program flow if these paths are exposed to user input. The complete lack of nonce and capability checks on its entry points, though currently limited in number, leaves the plugin vulnerable to exploitation should any of these entry points be exposed to user input in future updates or through interaction with other plugins.

Given the complete lack of vulnerability history, it's difficult to draw conclusions about past security practices. This could indicate a well-maintained plugin or simply a lack of historical reporting. The current analysis highlights a critical need to address the output escaping issue and the unsanitized taint flows. While the plugin currently has a low attack surface, the lack of robust authentication and sanitization on its existing pathways is a notable weakness.

Key Concerns

  • Significant unescaped output detected
  • Taint flows with unsanitized paths found
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Hashtag Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hashtag Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped13 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
page (options\easy-options.php:116)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Hashtag Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterthe_contenthashtag.php:35
actionadmin_enqueue_scriptshashtag.php:36
actionwp_headhashtag.php:37
actionadmin_initoptions\easy-options.php:32
actionadmin_menuoptions\easy-options.php:33
Maintenance & Trust

Hashtag Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 26, 2016
PHP min version
Downloads18K

Community Trust

Rating86/100
Number of ratings8
Active installs200
Developer Profile

Hashtag Developer Profile

takien

6 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hashtag

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hashtag/options/jscolor/jscolor.js
Version Parameters
hashtag-jscolor?ver=0.5

HTML / DOM Fingerprints

CSS Classes
hashtag
FAQ

Frequently Asked Questions about Hashtag