TM Replace Howdy Security & Risk Analysis

wordpress.org/plugins/tm-replace-howdy

Banish the "Howdy" greeting from the WordPress admin area with this simple to use plugin!

200 active installs v1.4.2 PHP + WP 3.8+ Updated Nov 20, 2015
howdyremove-howdyreplacereplace-howdytechnical-mastermind
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJun 19, 2025
Safety Verdict

Is TM Replace Howdy Safe to Use in 2026?

Use With Caution

Score 63/100

TM Replace Howdy has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jun 19, 2025Updated 10yr ago
Risk Assessment

The "tm-replace-howdy" plugin v1.4.2 exhibits a mixed security posture. On the positive side, the static analysis reveals a very small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. The code also demonstrates good practices by using prepared statements for all SQL queries. However, a significant concern arises from the output escaping, where 56% of the 18 total outputs are not properly escaped, indicating a potential for Cross-Site Scripting (XSS) vulnerabilities. Additionally, the taint analysis identified one flow with an unsanitized path, though it's not categorized as critical or high severity, it still warrants attention.

The vulnerability history presents a substantial risk. The plugin has a known CVE, and critically, it is currently unpatched. This single medium-severity vulnerability, last recorded in June 2025, suggests a pattern of past security weaknesses and a lack of ongoing maintenance to address them. While the absence of critical or high-severity CVEs is positive, the presence of an unpatched medium vulnerability, combined with the observed output escaping issues and unsanitized taint flow, means this plugin should be approached with caution. The small attack surface is a strength, but the unpatched vulnerability and code quality concerns outweigh this positive aspect, suggesting a medium to high overall risk.

Key Concerns

  • Unpatched medium vulnerability
  • 56% of outputs not properly escaped
  • Flow with unsanitized path
Vulnerabilities
1

TM Replace Howdy Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49972medium · 4.3Cross-Site Request Forgery (CSRF)

TM Replace Howdy <= 1.4.2 - Cross-Site Request Forgery

Jun 19, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

TM Replace Howdy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
10 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

56% escaped18 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
options_save_settings (index.php:209)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TM Replace Howdy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedindex.php:82
actioninitindex.php:83
actionadmin_menuindex.php:84
filtergettextindex.php:104
filteradmin_bar_menuindex.php:107
Maintenance & Trust

TM Replace Howdy Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 20, 2015
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings3
Active installs200
Developer Profile

TM Replace Howdy Developer Profile

David Wood

2 plugins · 210 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TM Replace Howdy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tm-replace-howdy/css/tm-replace-howdy.css
Version Parameters
tm-replace-howdy/css/tm-replace-howdy.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about TM Replace Howdy