thirdweb WP Security & Risk Analysis

wordpress.org/plugins/thirdweb-wp

A community WordPress plugin for thirdweb. Turn your WordPress website into Web3 instantly and easily with thirdweb. 🚀💻🧩

30 active installs v0.0.2 PHP 7.4+ WP 5.2+ Updated Feb 18, 2024
blokchaincryptonftthirdwebweb3
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is thirdweb WP Safe to Use in 2026?

Generally Safe

Score 85/100

thirdweb WP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The thirdweb-wp plugin v0.0.2 demonstrates a generally strong security posture based on the provided static analysis. The code adheres to best practices by utilizing prepared statements for all SQL queries and properly escaping all identified output, which significantly reduces the risk of common injection vulnerabilities. The absence of dangerous functions, file operations, and successful taint analysis flows further contribute to its secure foundation. Furthermore, the plugin has no recorded vulnerability history, suggesting a consistent and responsible approach to security from its developers.

However, a notable area for improvement lies in the lack of explicit nonce checks across its entry points. While the analysis indicates a small attack surface with only one shortcode and no unprotected AJAX handlers or REST API routes, a missing nonce check on the shortcode could still present a potential CSRF (Cross-Site Request Forgery) vulnerability. The presence of an external HTTP request also warrants careful review to ensure it is not susceptible to man-in-the-middle attacks or data exfiltration if not properly secured. Overall, the plugin is well-built from a code hygiene perspective, but the missing nonce check and the single external HTTP request are minor concerns that could be addressed for complete robustness.

Key Concerns

  • Missing nonce check on entry points
  • External HTTP request without explicit security review
Vulnerabilities
None known

thirdweb WP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

thirdweb WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Attack Surface

thirdweb WP Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[twcontractread] thirdweb.php:186
WordPress Hooks 3
actioninitthirdweb.php:189
actionadmin_menuthirdweb.php:190
actionadmin_initthirdweb.php:191
Maintenance & Trust

thirdweb WP Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.0
Last updatedFeb 18, 2024
PHP min version7.4
Downloads898

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

thirdweb WP Developer Profile

Waren Gonzaga

2 plugins · 30 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect thirdweb WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/thirdweb-wp/assets/thirdweb.png

HTML / DOM Fingerprints

Data Attributes
default_contract_addressdefault_chainengine_access_tokenengine_api_endpoint
JS Globals
console.error
Shortcode Output
<span>Error: No engine API endpoint found. Please set the engine API endpoint in the plugin settings.</span><span>Error: No engine access token found. Please set the engine access token in the plugin settings.</span><span>Error: No result found in the response.</span>
FAQ

Frequently Asked Questions about thirdweb WP