Text Spinner Security & Risk Analysis

wordpress.org/plugins/text-spinner

Allows you to use spintax in your posts, pages and theme files

1K active installs v1.3.0 PHP + WP 2.5+ Updated May 24, 2019
seospinnerspintaxtext-spinnerwordpress-seo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Text Spinner Safe to Use in 2026?

Generally Safe

Score 85/100

Text Spinner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "text-spinner" plugin version 1.3.0 demonstrates a generally strong security posture based on the provided static analysis. The code employs prepared statements for all SQL queries and ensures 100% output escaping, which are excellent practices for preventing common vulnerabilities like SQL injection and cross-site scripting (XSS). Furthermore, the absence of dangerous functions, file operations, and external HTTP requests, along with no reported vulnerabilities in its history, indicates a well-developed and secure codebase.

However, the analysis does reveal a notable weakness: a complete lack of nonce checks and capability checks across all entry points. While the current attack surface is small and consists of only one shortcode, and the taint analysis shows no immediate issues, this absence of authorization and integrity checks is a significant concern. If the shortcode were to ever process user-supplied data in a sensitive manner or interact with critical WordPress functionalities, this oversight could open the door to various attacks, including unauthorized actions or data manipulation, should a vulnerability be introduced in the future or if the plugin's functionality expands.

In conclusion, while the technical implementation of SQL and output handling is robust, the lack of robust authorization and integrity checks is the primary security concern. The plugin benefits from a clean vulnerability history and good coding practices in specific areas, but this single, albeit significant, omission prevents it from achieving an ideal security rating. Future development should prioritize the implementation of appropriate nonce and capability checks for all entry points, especially if the plugin's functionality evolves.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Text Spinner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Text Spinner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Text Spinner Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wpts_spin] text-spinner.php:41
Maintenance & Trust

Text Spinner Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 24, 2019
PHP min version
Downloads27K

Community Trust

Rating78/100
Number of ratings7
Active installs1K
Developer Profile

Text Spinner Developer Profile

Hassan Akhtar

1 plugin · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Text Spinner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[wpts_spin]
FAQ

Frequently Asked Questions about Text Spinner