TweetPress Security & Risk Analysis

wordpress.org/plugins/tweetpress

Use your Wordpress blog to host the photos you post to Twitter!

10 active installs v3.2 PHP + WP 2.3+ Updated Feb 16, 2011
image-hostingtweettwitpictwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TweetPress Safe to Use in 2026?

Generally Safe

Score 85/100

TweetPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "tweetpress" v3.2 plugin presents a mixed security posture. On the positive side, there are no known historical vulnerabilities (CVEs) and the plugin has a seemingly small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, the majority of SQL queries (81%) utilize prepared statements, which is a good security practice.

However, significant concerns arise from the static analysis. The presence of `create_function` is a clear red flag, as it can be a vector for arbitrary code execution if not handled with extreme care. The taint analysis reveals that all 5 analyzed flows have unsanitized paths, with 5 identified as high severity. This strongly suggests that user-supplied data is not being properly validated or sanitized before being used in sensitive operations, potentially leading to various injection vulnerabilities. The lack of any nonce checks or capability checks on the identified entry points (even if there are none listed, the absence of these checks is notable) also implies a lack of protection against common WordPress attacks like Cross-Site Request Forgery (CSRF) and privilege escalation. The extremely low percentage of properly escaped output (9%) is another major concern, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities.

In conclusion, while the plugin boasts a clean vulnerability history and good practices in SQL query preparation, the identified code signals and taint analysis results highlight critical weaknesses. The use of `create_function`, the prevalence of unsanitized tainted data, the lack of nonce/capability checks, and the poor output escaping collectively indicate a high-risk plugin that requires immediate attention and remediation to address these potential vulnerabilities.

Key Concerns

  • Dangerous function create_function detected
  • High severity unsanitized taint flows (5)
  • No nonce checks
  • No capability checks
  • Very low output escaping (9%)
  • Unsanitized paths in taint flows (5)
  • File operations present (15)
  • External HTTP requests present (1)
Vulnerabilities
None known

TweetPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

TweetPress Code Analysis

Dangerous Functions
1
Raw SQL Queries
5
22 prepared
Unescaped Output
30
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
15
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("TweetPressWidget");'));tweetpress-widget.php:75

SQL Query Safety

81% prepared27 total queries

Output Escaping

9% escaped33 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
tp_gallery (gallery.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

TweetPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionwidgets_inittweetpress-widget.php:75
actionwp_headtweetpress.php:97
actionadmin_menutweetpress.php:102
actionget_headertweetpress.php:309
filterthe_contenttweetpress.php:329
actionloop_starttweetpress.php:332
actionget_headertweetpress.php:346
actionplugins_loadedtweetpress.php:352
actionplugins_loadedtweetpress.php:353
actionadmin_noticestweetpress.php:726
Maintenance & Trust

TweetPress Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedFeb 16, 2011
PHP min version
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TweetPress Developer Profile

brandontreb

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TweetPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tweetpress/tweetpress.css

HTML / DOM Fingerprints

CSS Classes
tp-options
Data Attributes
data-page_iddata-allow_anondata-thumbs_countdata-configureddata-thumbnail_countdata-twitter_username+10 more
JS Globals
tp_settingsurl_shortenersAUTH_TYPE_ANONAUTH_TYPE_TWITTERAUTH_TYPE_WPTHUMBSIZE+2 more
FAQ

Frequently Asked Questions about TweetPress