Responsive TwentyTen Security & Risk Analysis

wordpress.org/plugins/responsive-twentyten

Makes your TwentyTen themed site have a responsive and fluid layout

400 active installs v0.0.3 PHP + WP 2.8+ Updated Mar 1, 2011
cssresponsivetwentyten
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Responsive TwentyTen Safe to Use in 2026?

Generally Safe

Score 85/100

Responsive TwentyTen has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "responsive-twentyten" plugin v0.0.3 demonstrates a strong adherence to secure coding practices in several key areas. The absence of any recorded CVEs, combined with zero total flows analyzed and zero flows with unsanitized paths in the taint analysis, suggests a clean codebase from a vulnerability perspective. Furthermore, the plugin does not engage in file operations or external HTTP requests, and all SQL queries utilize prepared statements, significantly reducing common attack vectors.

However, the analysis reveals a critical deficiency in output escaping. With one total output identified and 0% properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from the plugin and is not properly escaped can be manipulated by attackers to inject malicious scripts. Additionally, the complete lack of nonce checks and capability checks across all entry points means that if any entry points were to be introduced or discovered, they would be entirely unprotected against unauthorized access or actions.

While the plugin's current attack surface is zero, indicating no active entry points without authentication, this might be due to its current limited functionality rather than deliberate security design. The absence of any recorded vulnerabilities in its history is a positive sign, but it's overshadowed by the identified output escaping flaw. The plugin has strengths in its avoidance of common risky behaviors like raw SQL and external requests, but the unescaped output is a glaring weakness that needs immediate attention.

Key Concerns

  • Unescaped output
  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
Vulnerabilities
None known

Responsive TwentyTen Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Responsive TwentyTen Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Responsive TwentyTen Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headresponsive-twentyten.php:37
Maintenance & Trust

Responsive TwentyTen Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMar 1, 2011
PHP min version
Downloads11K

Community Trust

Rating96/100
Number of ratings5
Active installs400
Developer Profile

Responsive TwentyTen Developer Profile

toddhalfpenny

9 plugins · 21K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
371 days
View full developer profile
Detection Fingerprints

How We Detect Responsive TwentyTen

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/responsive-twentyten/css/style.css/wp-content/plugins/responsive-twentyten/css/phone_style.css

HTML / DOM Fingerprints

Data Attributes
name="viewport"content="width=device-width, minimum-scale=1.0, maximum-scale=1.0"
FAQ

Frequently Asked Questions about Responsive TwentyTen