
PrimeTime WordPress + Discourse SSO Security & Risk Analysis
wordpress.org/plugins/pt-wp-discourse-ssoThis plugin provides single sign-on capabilities for Discourse using WordPress user authentication.
Is PrimeTime WordPress + Discourse SSO Safe to Use in 2026?
Generally Safe
Score 85/100PrimeTime WordPress + Discourse SSO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "pt-wp-discourse-sso" plugin, version 0.2.3, exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in several areas: it has no known CVEs, a clean vulnerability history, and its single SQL query utilizes prepared statements. Furthermore, the static analysis reveals a remarkably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. Taint analysis also shows no critical or high severity flows, which is a strong indicator of secure data handling.
However, there are notable concerns that temper this positive outlook. The presence of the `create_function` is a significant security anti-pattern, as it can be exploited to execute arbitrary PHP code if not handled with extreme care, and in many contexts, is considered deprecated and insecure. Additionally, the plugin struggles with output escaping, with only 33% of outputs being properly escaped. This indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, especially if any of the unsanitized outputs are influenced by user input. The complete lack of nonce checks and capability checks, while potentially mitigated by the limited attack surface, is a weakness that could become a serious issue if the plugin's functionality were ever to expand or be integrated differently.
In conclusion, while the plugin has a clean vulnerability history and a limited attack surface, the use of `create_function` and the poor output escaping are significant weaknesses. These specific issues present real risks that need to be addressed. The lack of broader security checks like nonces and capability checks further contributes to a less robust security posture than ideal, despite the apparent absence of direct exploitability in the current configuration.
Key Concerns
- Dangerous function create_function() used
- Only 33% of outputs properly escaped
- 0 Nonce checks found
- 0 Capability checks found
PrimeTime WordPress + Discourse SSO Security Vulnerabilities
PrimeTime WordPress + Discourse SSO Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
PrimeTime WordPress + Discourse SSO Attack Surface
WordPress Hooks 8
Maintenance & Trust
PrimeTime WordPress + Discourse SSO Maintenance & Trust
Maintenance Signals
Community Trust
PrimeTime WordPress + Discourse SSO Alternatives
WP Discourse
wp-discourse
This plugin allows you to use Discourse as a community engine for your WordPress website. The plugin is not a substitute for Disqus type commenting sy …
codoforum-sso
codoforum-sso
Integrates Codoforum forum software with WordPress using SSO(Single Sign On)
Forumial – Cloud Forum Platform – SSO
forumial-sso
Integrates Forumial forum software with WordPress using SSO (Single Sign On)
bbPress
bbpress
bbPress is forum software for WordPress.
BlossomThemes Toolkit
blossomthemes-toolkit
BlossomThemes Toolkit provides you necessary widgets for better and effective blogging.
PrimeTime WordPress + Discourse SSO Developer Profile
1 plugin · 10 total installs
How We Detect PrimeTime WordPress + Discourse SSO
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pt-wp-discourse-sso/public/css/pt-wp-discourse-sso.css/wp-content/plugins/pt-wp-discourse-sso/public/js/pt-wp-discourse-sso.js/wp-content/plugins/pt-wp-discourse-sso/public/js/pt-wp-discourse-sso.jspt-wp-discourse-sso/public/css/pt-wp-discourse-sso.css?ver=pt-wp-discourse-sso/public/js/pt-wp-discourse-sso.js?ver=HTML / DOM Fingerprints
<!-- IF THIS FILE IS CALLED DIRECTLY, ABORT. --><!-- SET SOME CONSTANTS --><!-- PUBLIC-FACING FUNCTIONALITY --><!-- REGISTER HOOKS THAT ARE FIRED WHEN THE PLUGIN IS ACTIVATED OR DEACTIVATED. -->+35 morewpdisc_sso_ajax_obj