微信侯斯特 WordPress 伴侣插件 Security & Risk Analysis

wordpress.org/plugins/weixinhost

一键实现 WordPress 博客与微信侯斯特的连接,可以方便使用侯斯特功能并同时连接微信。

10 active installs v1.0.3 PHP + WP 3.0+ Updated Unknown
weixin%e5%be%ae%e4%bf%a1%e4%be%af%e6%96%af%e7%89%b9
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is 微信侯斯特 WordPress 伴侣插件 Safe to Use in 2026?

Generally Safe

Score 100/100

微信侯斯特 WordPress 伴侣插件 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The weixinhost v1.0.3 plugin exhibits a generally good security posture concerning its attack surface and SQL query handling. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits potential entry points for attackers. Furthermore, all detected SQL queries utilize prepared statements, which is a strong defense against SQL injection vulnerabilities. However, concerns arise from the output escaping and the presence of external HTTP requests. Only 50% of output is properly escaped, indicating a potential risk of Cross-Site Scripting (XSS) vulnerabilities if the unescaped output is rendered within a user's browser. The two external HTTP requests, while not inherently vulnerable, represent potential attack vectors if the plugin relies on untrusted external sources for data or functionality without proper validation. The taint analysis, while showing no critical or high-severity flows, did reveal two flows with unsanitized paths, which warrants further investigation as these could potentially lead to issues if not handled carefully. The plugin's vulnerability history is clean, with no recorded CVEs, suggesting a lack of previously exploited weaknesses. This is a positive indicator, but it does not guarantee future security. Overall, the plugin has strengths in its limited attack surface and secure SQL practices, but weaknesses in output escaping and the handling of external requests require attention.

Key Concerns

  • Output escaping is not consistently applied
  • Taint analysis indicates unsanitized paths
  • External HTTP requests are present
Vulnerabilities
None known

微信侯斯特 WordPress 伴侣插件 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

微信侯斯特 WordPress 伴侣插件 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

50% escaped6 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
weixinhost_display_config_page (weixinhost.php:156)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

微信侯斯特 WordPress 伴侣插件 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitweixinhost.php:17
filterplugin_action_linksweixinhost.php:124
actionadmin_menuweixinhost.php:139
actionjetpack_admin_menuweixinhost.php:143
Maintenance & Trust

微信侯斯特 WordPress 伴侣插件 Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

微信侯斯特 WordPress 伴侣插件 Developer Profile

Weixinhost

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect 微信侯斯特 WordPress 伴侣插件

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/weixinhost/static/js/weixinhost.js/wp-content/plugins/weixinhost/static/css/weixinhost.css
Script Paths
/wp-content/plugins/weixinhost/static/js/weixinhost.js
Version Parameters
weixinhost/style.css?ver=weixinhost/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-weixinhost-token
JS Globals
weixinhost_tokenweixinhost_api_url
FAQ

Frequently Asked Questions about 微信侯斯特 WordPress 伴侣插件