Last.wp Security & Risk Analysis

wordpress.org/plugins/lastwp

Last.wp is a Wordpress widget that shows your guests what you've been listening to on Last.fm, via a jQuery plugin!

10 active installs v0.2 PHP + WP 2.8+ Updated Feb 4, 2010
client-sidelast-fmlast-wpmusicwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Last.wp Safe to Use in 2026?

Generally Safe

Score 85/100

Last.wp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "lastwp" plugin v0.2 exhibits a mixed security posture. On the positive side, there are no registered CVEs and no identified vulnerabilities in its history. Furthermore, the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and not performing any file operations or external HTTP requests. The absence of a significant attack surface through AJAX handlers, REST API routes, shortcodes, or cron events is also a strength.

However, significant concerns arise from the static code analysis. The presence of the `create_function` is a dangerous function that can lead to remote code execution if not handled with extreme care. More critically, 100% of the plugin's outputs are not properly escaped. This is a major security flaw that can pave the way for Cross-Site Scripting (XSS) attacks, allowing malicious actors to inject arbitrary scripts into the user's browser. The complete lack of nonce and capability checks, while seemingly mitigated by a zero attack surface, leaves the plugin vulnerable if any entry points are accidentally exposed or if future versions introduce them without proper security measures.

While the lack of vulnerability history is a positive indicator, it should not overshadow the critical security weaknesses identified in the code. The unescaped output and the use of `create_function` represent immediate and serious risks that require prompt attention. The plugin's strengths lie in its limited scope and SQL handling, but these are overshadowed by its output sanitization and dangerous function usage.

Key Concerns

  • 100% of outputs are not properly escaped
  • Use of dangerous function: create_function
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Last.wp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Last.wp Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
27
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("WP_Widget_lastWP");'));lastWP.php:112

Output Escaping

0% escaped27 total outputs
Attack Surface

Last.wp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initlastWP.php:112
actioninitlastWP.php:113
Maintenance & Trust

Last.wp Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedFeb 4, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Last.wp Developer Profile

kylehotchkiss

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Last.wp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lastwp/images/lfm_noart.png/wp-content/plugins/lastwp/css/lastwp.css
Script Paths
/wp-content/plugins/lastwp/scripts/jquery.lastfm.js

HTML / DOM Fingerprints

CSS Classes
widget_lastWPlastWP-lfm_itemlfm_artlfm_playinglfm_songlfm_artistlfm_album+2 more
Data Attributes
widget_id
JS Globals
jQuery$
FAQ

Frequently Asked Questions about Last.wp