Tweets As Posts Security & Risk Analysis

wordpress.org/plugins/tweets-as-posts

Tweets As Posts imports all tweets tagged with specified hashtags from twitter accounts into WordPress as posts.

10 active installs v1.1 PHP + WP 2.0.2+ Updated May 28, 2012
feednewspoststweetstwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Tweets As Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Tweets As Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "tweets-as-posts" v1.1 plugin presents a mixed security posture. On the positive side, it boasts a clean vulnerability history with no recorded CVEs and a generally limited attack surface with no direct AJAX or REST API endpoints exposed without authentication. Furthermore, the absence of file operations, external HTTP requests, and dangerous functions are good indicators of security awareness.

However, significant concerns arise from the static analysis. The most alarming finding is a taint flow with an unsanitized path. This suggests a potential for attackers to inject malicious code or manipulate data that is not properly validated or escaped before being used, which could lead to vulnerabilities like Cross-Site Scripting (XSS) or path traversal. Additionally, the plugin fails to implement any output escaping for its outputs, meaning any data displayed to users is not protected against malicious injection. The lack of nonce and capability checks on its entry points, while limited in number, also represents a potential weakness if any of these were to be exposed or exploited.

In conclusion, while the plugin's history is positive and its direct attack surface appears small, the critical taint flow and complete lack of output escaping represent serious security flaws that require immediate attention. The absence of these fundamental security practices significantly elevates the risk associated with using this plugin.

Key Concerns

  • Taint flow with unsanitized path detected
  • No output escaping for any outputs
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Tweets As Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Tweets As Posts Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
4 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared5 total queries

Output Escaping

0% escaped6 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<tweets-as-posts-admin> (tweets-as-posts-admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Tweets As Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menutweets-as-posts.php:70
actiontap_hourly_update_actiontweets-as-posts.php:97

Scheduled Events 1

tap_hourly_update_action
Maintenance & Trust

Tweets As Posts Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMay 28, 2012
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Tweets As Posts Developer Profile

cparekh

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Tweets As Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tweets-as-posts/
Version Parameters
tweets-as-posts/style.css?ver=tweets-as-posts/tweets-as-posts-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
tap_optionstap_setting
HTML Comments
<!-- Tweets As Posts --><!-- Tweets As Posts Admin -->
Data Attributes
data-tap-setting
JS Globals
tap_admin_nonce
FAQ

Frequently Asked Questions about Tweets As Posts