PrimeTime WordPress + Discourse SSO Security & Risk Analysis

wordpress.org/plugins/pt-wp-discourse-sso

This plugin provides single sign-on capabilities for Discourse using WordPress user authentication.

10 active installs v0.2.3 PHP + WP 3.6+ Updated May 4, 2015
discourseforumsso
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PrimeTime WordPress + Discourse SSO Safe to Use in 2026?

Generally Safe

Score 85/100

PrimeTime WordPress + Discourse SSO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "pt-wp-discourse-sso" plugin, version 0.2.3, exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in several areas: it has no known CVEs, a clean vulnerability history, and its single SQL query utilizes prepared statements. Furthermore, the static analysis reveals a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. Taint analysis also shows no critical or high severity flows, which is a strong indicator of secure data handling.

However, there are notable concerns that temper this positive outlook. The presence of the `create_function` is a significant security anti-pattern, as it can be exploited to execute arbitrary PHP code if not handled with extreme care, and in many contexts, is considered deprecated and insecure. Additionally, the plugin struggles with output escaping, with only 33% of outputs being properly escaped. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, especially if any of the unsanitized outputs are influenced by user input. The complete lack of nonce checks and capability checks, while potentially mitigated by the limited attack surface, is a weakness that could become a serious issue if the plugin's functionality were ever to expand or be integrated differently.

In conclusion, while the plugin has a clean vulnerability history and a limited attack surface, the use of `create_function` and the poor output escaping are significant weaknesses. These specific issues present real risks that need to be addressed. The lack of broader security checks like nonces and capability checks further contributes to a less robust security posture than ideal, despite the apparent absence of direct exploitability in the current configuration.

Key Concerns

  • Dangerous function create_function() used
  • Only 33% of outputs properly escaped
  • 0 Nonce checks found
  • 0 Capability checks found
Vulnerabilities
None known

PrimeTime WordPress + Discourse SSO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PrimeTime WordPress + Discourse SSO Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
16
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$callback = create_function('', 'echo "'.str_replace('"', '\"', $section['desc']).'";');admin\includes\class.settings-api.php:97

SQL Query Safety

100% prepared1 total queries

Output Escaping

33% escaped24 total outputs
Attack Surface

PrimeTime WordPress + Discourse SSO Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_enqueue_scriptsadmin\includes\class.settings-api.php:32
actionadmin_initadmin\includes\class.settings.php:25
actionadmin_menuadmin\includes\class.settings.php:26
actionplugins_loadedpt-wp-discourse-sso.php:39
actionplugins_loadedpt-wp-discourse-sso.php:59
actionwpmu_new_blogpublic\class-pt-wp-discourse-sso.php:68
actioninitpublic\class-pt-wp-discourse-sso.php:76
actionadmin_noticespublic\class-pt-wp-discourse-sso.php:106
Maintenance & Trust

PrimeTime WordPress + Discourse SSO Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 4, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings6
Active installs10
Developer Profile

PrimeTime WordPress + Discourse SSO Developer Profile

etcio

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PrimeTime WordPress + Discourse SSO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pt-wp-discourse-sso/public/css/pt-wp-discourse-sso.css/wp-content/plugins/pt-wp-discourse-sso/public/js/pt-wp-discourse-sso.js
Script Paths
/wp-content/plugins/pt-wp-discourse-sso/public/js/pt-wp-discourse-sso.js
Version Parameters
pt-wp-discourse-sso/public/css/pt-wp-discourse-sso.css?ver=pt-wp-discourse-sso/public/js/pt-wp-discourse-sso.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- IF THIS FILE IS CALLED DIRECTLY, ABORT. --><!-- SET SOME CONSTANTS --><!-- PUBLIC-FACING FUNCTIONALITY --><!-- REGISTER HOOKS THAT ARE FIRED WHEN THE PLUGIN IS ACTIVATED OR DEACTIVATED. -->+35 more
JS Globals
wpdisc_sso_ajax_obj
FAQ

Frequently Asked Questions about PrimeTime WordPress + Discourse SSO