
TweetPress Security & Risk Analysis
wordpress.org/plugins/tweetpressUse your Wordpress blog to host the photos you post to Twitter!
Is TweetPress Safe to Use in 2026?
Generally Safe
Score 85/100TweetPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "tweetpress" v3.2 plugin presents a mixed security posture. On the positive side, there are no known historical vulnerabilities (CVEs) and the plugin has a seemingly small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, the majority of SQL queries (81%) utilize prepared statements, which is a good security practice.
However, significant concerns arise from the static analysis. The presence of `create_function` is a clear red flag, as it can be a vector for arbitrary code execution if not handled with extreme care. The taint analysis reveals that all 5 analyzed flows have unsanitized paths, with 5 identified as high severity. This strongly suggests that user-supplied data is not being properly validated or sanitized before being used in sensitive operations, potentially leading to various injection vulnerabilities. The lack of any nonce checks or capability checks on the identified entry points (even if there are none listed, the absence of these checks is notable) also implies a lack of protection against common WordPress attacks like Cross-Site Request Forgery (CSRF) and privilege escalation. The extremely low percentage of properly escaped output (9%) is another major concern, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities.
In conclusion, while the plugin boasts a clean vulnerability history and good practices in SQL query preparation, the identified code signals and taint analysis results highlight critical weaknesses. The use of `create_function`, the prevalence of unsanitized tainted data, the lack of nonce/capability checks, and the poor output escaping collectively indicate a high-risk plugin that requires immediate attention and remediation to address these potential vulnerabilities.
Key Concerns
- Dangerous function create_function detected
- High severity unsanitized taint flows (5)
- No nonce checks
- No capability checks
- Very low output escaping (9%)
- Unsanitized paths in taint flows (5)
- File operations present (15)
- External HTTP requests present (1)
TweetPress Security Vulnerabilities
TweetPress Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
TweetPress Attack Surface
WordPress Hooks 10
Maintenance & Trust
TweetPress Maintenance & Trust
Maintenance Signals
Community Trust
TweetPress Alternatives
Twitter2Press
twitter2press
Use your Wordpress blog to host the photos you post to Twitter!
TwitPic
twitpic
Displays your latest pictures from TwitPic in the sidebar of your blog. The plugin is widget ready and comes with many configuration options!
Easy Twitter Feed Widget Plugin
easy-twitter-feed-widget
Add twitter feeds on your WordPress site by using the Easy Twitter Feed Widget plugin.
Official Twitter and Periscope plugin for WordPress. Embed content and grow your audience. Requires PHP 5.6 or greater.
Autopost for X (formerly Autoshare for Twitter)
autoshare-for-twitter
Automatically shares the post title or custom message and a link to the post to X/Twitter.
TweetPress Developer Profile
1 plugin · 10 total installs
How We Detect TweetPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/tweetpress/tweetpress.cssHTML / DOM Fingerprints
tp-optionsdata-page_iddata-allow_anondata-thumbs_countdata-configureddata-thumbnail_countdata-twitter_username+10 moretp_settingsurl_shortenersAUTH_TYPE_ANONAUTH_TYPE_TWITTERAUTH_TYPE_WPTHUMBSIZE+2 more