ThreatPoint IP Reputation Security & Risk Analysis

wordpress.org/plugins/threatpoint-api

This plugin protects WordPress Sites from unwanted malicious access attempts by leveraging IP reputation data provided by the ThreatPoint IP reputatio …

10 active installs v2.7 PHP 5.4+ WP 3.5.2+ Updated Apr 23, 2024
ipreputationtorwp-adminxmlrpc
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ThreatPoint IP Reputation Safe to Use in 2026?

Generally Safe

Score 85/100

ThreatPoint IP Reputation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The threatpoint-api v2.7 plugin exhibits a generally positive security posture with several strong indicators. The absence of any known CVEs, unpatched vulnerabilities, or identified dangerous functions is a significant strength. Furthermore, the plugin utilizes prepared statements exclusively for its SQL queries and has a moderate rate of output escaping, suggesting an awareness of common web security pitfalls. The plugin also avoids common risks like shortcodes and cron events, and has a very limited attack surface as reported by static analysis, with no exposed AJAX handlers, REST API routes, or cron events without authentication. However, there are areas for concern. The taint analysis reveals three flows with unsanitized paths, which, despite not being classified as critical or high severity, still represent potential vulnerabilities if these paths are exposed to user input. The lack of nonce checks and capability checks across the board is a significant weakness, especially given the presence of external HTTP requests which could be leveraged in cross-site request forgery (CSRF) attacks if not properly protected. The 33% of outputs that are not properly escaped also present a risk of cross-site scripting (XSS) vulnerabilities. Overall, while the plugin has strong foundations in areas like SQL handling and has a small attack surface, the issues with unsanitized paths, lack of nonce/capability checks, and imperfect output escaping introduce notable risks that should be addressed.

Key Concerns

  • Flows with unsanitized paths
  • Unescaped output (33%)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

ThreatPoint IP Reputation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ThreatPoint IP Reputation Release Timeline

vrelease-1.9
vrelease-1.8
vrelease-1.7
vrelease2.7
vrelease-1.6
vrelease-1.5
vrelease2.5
vrelease-1.4
vrelease-2.4
vrelease-1.3
vrelease2.3
vrelease-1.2
vrelease2.2
vrelease-2.1
vrelease-2.0
Code Analysis
Analyzed Mar 16, 2026

ThreatPoint IP Reputation Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
13
25 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
5
Bundled Libraries
0

Output Escaping

66% escaped38 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
threatpoint_ip_rep (Threatpoint-api.php:470)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ThreatPoint IP Reputation Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menuThreatpoint-api.php:16
actionadmin_initThreatpoint-api.php:17
actionupdate_option_tp_api_settingsThreatpoint-api.php:439
actionupdate_option_tp_api_settingsThreatpoint-api.php:466
actionlogin_headThreatpoint-api.php:469
actionwp_headThreatpoint-api.php:623
Maintenance & Trust

ThreatPoint IP Reputation Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedApr 23, 2024
PHP min version5.4
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

ThreatPoint IP Reputation Developer Profile

ThreatPoint UK

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ThreatPoint IP Reputation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ThreatPoint IP Reputation