Trancelantic Playlist Security & Risk Analysis

wordpress.org/plugins/trancelantic-playlist

Trancelantic Playlist is a cool plugin that is able to display your currently played song on your website through a widget.

20 active installs v1.2.1 PHP 5.2.4+ WP 4.9.8+ Updated Feb 2, 2021
currently_played_songslast-fmplaylistscrobblingspotify
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Trancelantic Playlist Safe to Use in 2026?

Generally Safe

Score 85/100

Trancelantic Playlist has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "trancelantic-playlist" v1.2.1 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals indicate a lack of dangerous functions, no file operations, and no external HTTP requests, all of which are positive security indicators. The complete absence of known vulnerabilities in its history also suggests a history of responsible development.

However, a notable concern arises from the output escaping. With 42 total outputs and only 14% properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. While the plugin doesn't appear to have any direct SQL injection risks due to the use of prepared statements, and there are no recorded taint flows suggesting immediate critical or high severity issues, the lack of proper output sanitization could allow attackers to inject malicious scripts through user-controlled data that is later displayed to other users.

In conclusion, the plugin's strengths lie in its minimal attack surface and lack of exploitable code patterns. The primary weakness is the widespread lack of output escaping, which represents a clear and present risk of XSS vulnerabilities. Developers should prioritize addressing this issue to improve the plugin's overall security.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Trancelantic Playlist Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Trancelantic Playlist Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
36
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

14% escaped42 total outputs
Attack Surface

Trancelantic Playlist Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedtrancelantic-playlist.php:31
actionwidgets_inittrancelantic-playlist.php:34
actionwp_headtrancelantic-playlist.php:37
Maintenance & Trust

Trancelantic Playlist Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.0
Last updatedFeb 2, 2021
PHP min version5.2.4
Downloads2K

Community Trust

Rating60/100
Number of ratings1
Active installs20
Developer Profile

Trancelantic Playlist Developer Profile

wilfriedkatschmarz

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Trancelantic Playlist

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/trancelantic-playlist/css/style.css/wp-content/plugins/trancelantic-playlist/js/script.js
Script Paths
/wp-content/plugins/trancelantic-playlist/js/script.js
Version Parameters
trancelantic-playlist/css/style.css?ver=trancelantic-playlist/js/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
Stop on direct call.Enjoy our script.
FAQ

Frequently Asked Questions about Trancelantic Playlist