WP-Spotify Security & Risk Analysis

wordpress.org/plugins/wp-spotify

Link Spotify tracks to your posts and pages. Including widget.

30 active installs v2.0 PHP + WP 2.0.2+ Updated Feb 6, 2012
musicpostsongspotifywidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Spotify Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Spotify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "wp-spotify" v2.0 plugin exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The lack of any recorded CVEs, critical taint flows, or dangerous functions is a strong indicator of a well-maintained and secure codebase. Furthermore, the absence of a significant attack surface through AJAX handlers, REST API routes, shortcodes, or cron events reduces the potential for external exploitation.

However, there are notable areas for improvement. A significant concern is the complete lack of output escaping, meaning any data displayed by the plugin is not sanitized, opening the door for Cross-Site Scripting (XSS) vulnerabilities. The use of raw SQL queries without prepared statements, while not inherently critical given the limited number, introduces a risk of SQL injection if the data used in these queries is not meticulously validated. The absence of nonce checks and capability checks also means that actions performed by the plugin might not be adequately protected against unauthorized execution.

In conclusion, while "wp-spotify" v2.0 benefits from a clean vulnerability history and a minimal attack surface, the critical shortcomings in output escaping and the presence of raw SQL queries represent significant security weaknesses. Addressing these issues is crucial to strengthening the plugin's overall security and preventing potential attacks.

Key Concerns

  • No output escaping detected
  • SQL queries not using prepared statements
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WP-Spotify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Spotify Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
1 prepared
Unescaped Output
13
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

13% prepared8 total queries

Output Escaping

0% escaped13 total outputs
Attack Surface

WP-Spotify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterthe_contentwp-spotify.class.php:21
actionwp_headwp-spotify.class.php:22
actionwp_insert_postwp-spotify.class.php:23
actionwp_update_postwp-spotify.class.php:24
actionplugins_loadedwp-spotify.class.php:25
Maintenance & Trust

WP-Spotify Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedFeb 6, 2012
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

WP-Spotify Developer Profile

NEOLiNES

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Spotify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-spotify/wp-spotify.style.css

HTML / DOM Fingerprints

CSS Classes
spotifytracksharetracktitle
Data Attributes
ondblclickonmouseup
Shortcode Output
<div class="spotify"><ul>
FAQ

Frequently Asked Questions about WP-Spotify