TwitterPad Security & Risk Analysis

wordpress.org/plugins/twitterpad

TwitterPad allows twitter users to automatically collect tweets using custom search strings which are added to a specified page or as a new blog post

10 active installs v1.3.3 PHP + WP 2.5+ Updated Unknown
aggregationautobloggingpagesrsstwitter
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TwitterPad Safe to Use in 2026?

Generally Safe

Score 100/100

TwitterPad has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "twitterpad" v1.3.3 plugin presents a mixed security posture. On the positive side, the plugin demonstrates good practices in its handling of SQL queries, exclusively using prepared statements, and it has no recorded vulnerability history, suggesting a generally well-maintained codebase. Furthermore, the static analysis did not reveal any critical or high-severity taint flows, nor a large attack surface with unprotected entry points.

However, significant concerns arise from the presence of dangerous functions, specifically `unserialize`, which is notoriously prone to deserialization vulnerabilities if untrusted data is processed. The low rate of output escaping (29%) is also a major red flag, indicating a high likelihood of cross-site scripting (XSS) vulnerabilities, as user-controlled data is likely being outputted without proper sanitization. The complete absence of capability checks is another critical weakness, as it implies that any user, regardless of their role or permissions, can trigger plugin functionalities that might have unintended consequences or expose sensitive information.

In conclusion, while the plugin benefits from clean SQL practices and a clean CVE record, the identified issues with `unserialize`, widespread lack of output escaping, and missing capability checks introduce substantial security risks. These vulnerabilities, if exploited, could lead to RCE (Remote Code Execution) and XSS, significantly impacting the security of a WordPress site. The plugin requires immediate attention and remediation of these critical code quality issues.

Key Concerns

  • Dangerous function 'unserialize' found
  • Low output escaping rate (29%)
  • No capability checks found
Vulnerabilities
None known

TwitterPad Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

TwitterPad Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
1 prepared
Unescaped Output
12
5 escaped
Nonce Checks
6
Capability Checks
0
File Operations
11
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserializereturn unserialize(file_get_contents($this->name));simplepie.php:8686
unserialize$data = unserialize($row[1]);simplepie.php:8974
unserialize$feed['child'][SIMPLEPIE_NAMESPACE_ATOM_10]['entry'][] = unserialize($row[0]);simplepie.php:9020

SQL Query Safety

100% prepared1 total queries

Output Escaping

29% escaped17 total outputs
Attack Surface

TwitterPad Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninittwpad.php:88
actionadmin_menutwpad.php:89
actionwp_print_scriptstwpad.php:90
Maintenance & Trust

TwitterPad Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

TwitterPad Developer Profile

mhawksey

4 plugins · 40 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TwitterPad

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/twitterpad/style.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about TwitterPad