
RunPress Security & Risk Analysis
wordpress.org/plugins/runpressImports your sports activities (have a look at the readme for details) from the Runtastic website. Displays the data via shortcodes on your webpage.
Is RunPress Safe to Use in 2026?
Generally Safe
Score 100/100RunPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The runpress plugin v1.4.2 exhibits a mixed security posture. On the positive side, the plugin has no known historical vulnerabilities (CVEs), which suggests a history of responsible development and maintenance. Furthermore, the static analysis indicates a small attack surface with no unprotected AJAX handlers or REST API routes, and a limited number of shortcodes and cron events. Taint analysis also shows no critical or high severity flows with unsanitized paths, and no dangerous functions are used.
However, there are significant concerns within the code's implementation. The plugin heavily relies on SQL queries without utilizing prepared statements, a practice that exposes it to a high risk of SQL injection vulnerabilities. Compounding this, the output escaping is exceptionally poor, with only 3% of outputs being properly escaped, indicating a severe risk of Cross-Site Scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks for its entry points is also a major security weakness, allowing unauthorized users to potentially trigger plugin functionalities. The presence of the DataTables library, if not managed and updated diligently, could also introduce risks if it's an outdated version.
In conclusion, while the plugin benefits from a clean vulnerability history and a controlled attack surface, the lack of prepared statements for SQL queries and the pervasive lack of output escaping create substantial security risks. The absence of nonce and capability checks further exacerbates these issues. The plugin requires immediate attention to address these fundamental security flaws to mitigate the significant XSS and SQL injection potential.
Key Concerns
- SQL queries without prepared statements
- Poor output escaping (only 3% properly escaped)
- No nonce checks
- No capability checks
- Bundled library (DataTables) - potential for outdated version
RunPress Security Vulnerabilities
RunPress Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
RunPress Attack Surface
Shortcodes 1
WordPress Hooks 11
Scheduled Events 2
Maintenance & Trust
RunPress Maintenance & Trust
Maintenance Signals
Community Trust
RunPress Alternatives
Simply Strava
simply-strava
A simple Strava widget for Wordpress
Marquee Running Text
marquee-running-text
Display eye-catching running text in your site's header effortlessly with the Marquee Running Text plugin.
OS DataHub Maps
os-datahub-maps
A plugin to display UK Ordnance Survey maps with markers and tracks.
WP-Routes Plugin
wp-routes
Add Cycle Routes, Mountain Bike Trails, Running Tracks, Walking Routes and much more to your posts and pages.
Run Log
run-log
Add running diary capabilities - log your sport activities, track and display: distance, duration, gear (e.g. shoes), elevation gain, calories, etc.
RunPress Developer Profile
1 plugin · 10 total installs
How We Detect RunPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/runpress/inc/css/widget.css/wp-content/plugins/runpress/inc/js/widget.js/wp-content/plugins/runpress/inc/js/widget.js/wp-content/plugins/runpress/inc/css/widget.css?ver=/wp-content/plugins/runpress/inc/js/widget.js?ver=HTML / DOM Fingerprints
runpress-widgetrunpress_widget