PuSHPress Security & Risk Analysis

wordpress.org/plugins/pushpress

Add WebSub (formerly known as PubSubHubbub) support to your WordPress site, with a built in hub.

20K active installs v0.1.10 PHP + WP 2.9+ Updated Mar 4, 2022
pubsubhubbubpushwebsubwordpress-com
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PuSHPress Safe to Use in 2026?

Generally Safe

Score 85/100

PuSHPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The pushpress plugin v0.1.10 exhibits a mixed security posture. On one hand, the absence of known vulnerabilities and a clean record regarding SQL injection and dangerous functions is a positive sign. The plugin also demonstrates good practices in its use of prepared statements for all SQL queries. However, significant concerns arise from the static analysis. The fact that 0% of output is properly escaped indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data could be rendered directly in the browser without sanitization. Additionally, the presence of two taint flows with unsanitized paths, while not flagged as critical or high severity, warrants investigation as these could represent potential security weaknesses.

The plugin's vulnerability history is currently clean, with no recorded CVEs. This might suggest a well-maintained codebase or simply a lack of targeted analysis or exploitation attempts. However, it should not be solely relied upon as an indicator of perfect security, especially given the red flags in the static analysis. The absence of capability checks and nonce checks in the context of the identified taint flows could exacerbate the impact of any potential vulnerabilities. While the attack surface appears small, the lack of robust protection mechanisms for data handling presents a notable risk.

Key Concerns

  • 0% of output properly escaped
  • 2 taint flows with unsanitized paths
  • 0 capability checks
  • 0 nonce checks
Vulnerabilities
None known

PuSHPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PuSHPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
check_topic (class-pushpress.php:82)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PuSHPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionrss2_headclass-pushpress.php:14
actionatom_headclass-pushpress.php:15
actionparse_requestclass-pushpress.php:18
actionpublish_postclass-pushpress.php:21
actionpushpress_scheduled_pingsend-ping.php:2
filterwp_titlesend-ping.php:41
filterself_linksend-ping.php:51
filterself_linksend-ping.php:61

Scheduled Events 1

pushpress_scheduled_ping
Maintenance & Trust

PuSHPress Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 4, 2022
PHP min version
Downloads378K

Community Trust

Rating72/100
Number of ratings5
Active installs20K
Developer Profile

PuSHPress Developer Profile

Joseph Scott

2 plugins · 20K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PuSHPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pushpress/pushpress.js
Script Paths
/wp-content/plugins/pushpress/pushpress.js
Version Parameters
pushpress/pushpress.js?ver=

HTML / DOM Fingerprints

JS Globals
pushpress
FAQ

Frequently Asked Questions about PuSHPress