RunPress Security & Risk Analysis

wordpress.org/plugins/runpress

Imports your sports activities (have a look at the readme for details) from the Runtastic website. Displays the data via shortcodes on your webpage.

10 active installs v1.4.2 PHP + WP 3.3.1+ Updated Unknown
cyclingnordicwalkingrunningrunpressruntastic
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RunPress Safe to Use in 2026?

Generally Safe

Score 100/100

RunPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The runpress plugin v1.4.2 exhibits a mixed security posture. On the positive side, the plugin has no known historical vulnerabilities (CVEs), which suggests a history of responsible development and maintenance. Furthermore, the static analysis indicates a small attack surface with no unprotected AJAX handlers or REST API routes, and a limited number of shortcodes and cron events. Taint analysis also shows no critical or high severity flows with unsanitized paths, and no dangerous functions are used.

However, there are significant concerns within the code's implementation. The plugin heavily relies on SQL queries without utilizing prepared statements, a practice that exposes it to a high risk of SQL injection vulnerabilities. Compounding this, the output escaping is exceptionally poor, with only 3% of outputs being properly escaped, indicating a severe risk of Cross-Site Scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks for its entry points is also a major security weakness, allowing unauthorized users to potentially trigger plugin functionalities. The presence of the DataTables library, if not managed and updated diligently, could also introduce risks if it's an outdated version.

In conclusion, while the plugin benefits from a clean vulnerability history and a controlled attack surface, the lack of prepared statements for SQL queries and the pervasive lack of output escaping create substantial security risks. The absence of nonce and capability checks further exacerbates these issues. The plugin requires immediate attention to address these fundamental security flaws to mitigate the significant XSS and SQL injection potential.

Key Concerns

  • SQL queries without prepared statements
  • Poor output escaping (only 3% properly escaped)
  • No nonce checks
  • No capability checks
  • Bundled library (DataTables) - potential for outdated version
Vulnerabilities
None known

RunPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RunPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
32
0 prepared
Unescaped Output
111
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
1

Bundled Libraries

DataTables

SQL Query Safety

0% prepared32 total queries

Output Escaping

3% escaped115 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
runpress_options (runpress.php:660)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

RunPress Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[runpress] runpress.php:92
WordPress Hooks 11
actionplugins_loadedrunpress.php:73
actionplugins_loadedrunpress.php:74
actionwidgets_initrunpress.php:75
actionadmin_menurunpress.php:76
actionrunpress_event_hookrunpress.php:77
actionwp_enqueue_scriptsrunpress.php:78
actionwp_dashboard_setuprunpress.php:79
actionwpmu_new_blogrunpress.php:82
filtercron_schedulesrunpress.php:85
filterwpmu_drob_tablesrunpress.php:89
actionadmin_noticesrunpress.php:96

Scheduled Events 2

runpress_event_hook
runpress_event_hook
Maintenance & Trust

RunPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

RunPress Developer Profile

Markus Frenzel

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RunPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/runpress/inc/css/widget.css/wp-content/plugins/runpress/inc/js/widget.js
Script Paths
/wp-content/plugins/runpress/inc/js/widget.js
Version Parameters
/wp-content/plugins/runpress/inc/css/widget.css?ver=/wp-content/plugins/runpress/inc/js/widget.js?ver=

HTML / DOM Fingerprints

CSS Classes
runpress-widgetrunpress_widget
FAQ

Frequently Asked Questions about RunPress