Plastic Tunes Security & Risk Analysis

wordpress.org/plugins/plastic-tunes

A Multi-User "Now Playing" plugin that accepts input from iTunes, WinAmp, and many more. Saves your information to your DB and will accomodate multiple users. Widget compatible and highly customizable.

10 active installs v1.4 PHP + WP 2.0.2+ Updated Sep 9, 2009
mediamusicnowplayingsidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Plastic Tunes Safe to Use in 2026?

Generally Safe

Score 85/100

Plastic Tunes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'plastic-tunes' v1.4 plugin exhibits a mixed security posture. While it boasts a zero attack surface from traditional entry points like AJAX handlers, REST API routes, and shortcodes, and has no known CVEs, significant concerns arise from its static analysis. The plugin's output escaping is alarmingly low, with only 29% of outputs properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis reveals 9 flows with unsanitized paths, including 3 classified as high severity. This suggests that user-supplied data is not being adequately validated or sanitized before being used in potentially sensitive operations. The lack of any capability checks or nonce checks on entry points, though currently zero, means that if any entry points were to be introduced in future versions, they would likely be unprotected by default. The plugin's SQL query handling is also a concern, with only 18% of queries using prepared statements, increasing the risk of SQL injection. The absence of any recorded vulnerability history might suggest a lack of active exploitation or discovery, but it does not negate the clear code-level risks present. The plugin's strengths lie in its lack of known vulnerabilities and a seemingly limited attack surface. However, the critical weaknesses in output escaping and taint handling, coupled with less secure SQL practices, demand immediate attention.

Key Concerns

  • High severity taint flows
  • Unsanitized paths in taint analysis
  • Low output escaping percentage
  • Low prepared statement usage for SQL
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Plastic Tunes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plastic Tunes Code Analysis

Dangerous Functions
0
Raw SQL Queries
14
3 prepared
Unescaped Output
50
20 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

18% prepared17 total queries

Output Escaping

29% escaped70 total outputs
Data Flows
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
plastic_table (plastic_functions.php:178)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Plastic Tunes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuplastic_tunes.php:190
actionadmin_headplastic_tunes.php:191
actionwidgets_initplastic_tunes.php:193
Maintenance & Trust

Plastic Tunes Maintenance & Trust

Maintenance Signals

WordPress version tested2.5
Last updatedSep 9, 2009
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Plastic Tunes Developer Profile

unalignedcoder

2 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plastic Tunes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/plastic-tunes/plastic.css

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Plastic Tunes