qTwit (for WordPress) Security & Risk Analysis

wordpress.org/plugins/qtwit

qTwit is a Wordpress widget that loads Tweets (from Twitter) on the client-side, via jQuery, as opposed to on the server.

10 active installs v0.5 PHP + WP 2.8+ Updated Mar 8, 2010
client-sidejquerytweettwitterwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is qTwit (for WordPress) Safe to Use in 2026?

Generally Safe

Score 85/100

qTwit (for WordPress) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The qtwit plugin v0.5 presents a concerning security posture despite an apparent lack of recorded vulnerabilities and a zero-attack surface. The static analysis reveals critical weaknesses, most notably the presence of the `create_function` construct, which is deprecated and can lead to significant security risks if not handled with extreme care. Furthermore, a complete absence of output escaping across all analyzed outputs is a major red flag. This means that any dynamic data rendered by the plugin is vulnerable to cross-site scripting (XSS) attacks, allowing attackers to inject malicious scripts into the browser of users viewing the content. The lack of nonce checks and capability checks further exacerbates these risks, as there are no built-in mechanisms to verify user authorization or prevent unauthorized actions.

While the plugin's vulnerability history is clean, this may be a reflection of its limited usage or simply luck rather than robust security. The absence of any taint flows is also noted, but given the significant output escaping issues and the presence of dangerous functions, this doesn't negate the immediate risks. The plugin's strengths lie in its use of prepared statements for SQL queries and its lack of external HTTP requests or file operations, which reduces some potential attack vectors. However, the overwhelming concern is the severe lack of output sanitization and the use of dangerous code constructs, creating a high likelihood of exploitable vulnerabilities, particularly XSS.

Key Concerns

  • Unescaped output across all outputs
  • Presence of dangerous function (create_function)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

qTwit (for WordPress) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

qTwit (for WordPress) Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
22
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("WP_Widget_qTwit");'));qTwit.php:75

Output Escaping

0% escaped22 total outputs
Attack Surface

qTwit (for WordPress) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initqTwit.php:75
actioninitqTwit.php:76
Maintenance & Trust

qTwit (for WordPress) Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedMar 8, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

qTwit (for WordPress) Developer Profile

kylehotchkiss

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect qTwit (for WordPress)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/qtwit/jquery.tweet.js

HTML / DOM Fingerprints

CSS Classes
widget_qTwittweetList-qTwit-admin-panel
HTML Comments
<!--<div style="font-size:9px;font-style:italic;text-align:right;"><a href="http://twitter.com/<?php echo $instance['username'];?>/">See more on Twitter</a>.</div>-->
Data Attributes
widget_id
JS Globals
jQuery
FAQ

Frequently Asked Questions about qTwit (for WordPress)