tags.mowster Security & Risk Analysis

wordpress.org/plugins/mowster-tags

Tags suggestions using YQL Yahoo Content Analysis API.

10 active installs v1.71 PHP + WP 3.0+ Updated May 8, 2015
postsuggesttagtaggingtags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is tags.mowster Safe to Use in 2026?

Generally Safe

Score 85/100

tags.mowster has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The mowster-tags plugin v1.71 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for SQL queries and properly escaping a high percentage of its output. The absence of known vulnerabilities in its history is also a strong indicator of a generally well-maintained plugin.

However, there are significant concerns regarding its attack surface and handling of potentially dangerous operations. The presence of an unprotected AJAX handler is a critical vulnerability, as it represents a direct entry point for attackers without any authentication or authorization checks. Additionally, the use of the `unserialize` function is a known security risk, as it can lead to Remote Code Execution (RCE) if not handled with extreme care and input validation. While taint analysis did not reveal critical or high-severity issues, the existence of flows with unsanitized paths, even if not explicitly critical, warrants caution. The lack of nonce checks on the AJAX handler amplifies the risk associated with that entry point.

In conclusion, while the plugin's history and SQL practices are commendable, the unprotected AJAX handler and the use of `unserialize` represent substantial security weaknesses. These are critical areas that need immediate attention to mitigate potential exploitation.

Key Concerns

  • Unprotected AJAX handler
  • Dangerous function: unserialize
  • Flows with unsanitized paths
  • Missing nonce checks
Vulnerabilities
None known

tags.mowster Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

tags.mowster Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
2
15 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$rt_settings->settings = @unserialize(get_option('mwtags_settings'));functions.php:43
unserialize$rt_settings->api = @unserialize(get_option('mwtags_api'));functions.php:44
unserialize$response = @unserialize(wp_remote_retrieve_body($request));functions.php:58
unserialize$new_value = @unserialize(get_option('mwtags_settings'));index.php:139

Output Escaping

88% escaped17 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

5 flows4 with unsanitized paths
join_post_mwtags (ajax\ajax.php:9)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

tags.mowster Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_join_post_mwtagsindex.php:177
WordPress Hooks 10
filterupgrader_post_installfunctions.php:85
actionadmin_print_scripts-post.phpindex.php:62
actionadmin_print_scripts-post-new.phpindex.php:63
actionadmin_print_scriptsindex.php:78
actionadmin_print_styles-post.phpindex.php:89
actionadmin_print_styles-post-new.phpindex.php:90
actionadmin_print_stylesindex.php:105
actionadmin_initindex.php:182
actionadmin_noticesindex.php:205
filterpre_set_site_transient_update_pluginsupdate.php:52
Maintenance & Trust

tags.mowster Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 8, 2015
PHP min version
Downloads5K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

tags.mowster Developer Profile

mowster

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect tags.mowster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mowster-tags/css/style.css/wp-content/plugins/mowster-tags/js/tags.js
Script Paths
/wp-content/plugins/mowster-tags/js/tags.js
Version Parameters
mowster-tags/style.css?ver=mowster-tags/js/tags.js?ver=

HTML / DOM Fingerprints

JS Globals
mowsterVars
FAQ

Frequently Asked Questions about tags.mowster