WP-Status.net Security & Risk Analysis

wordpress.org/plugins/wp-statusnet

Posts your blog posts to one or multiple Status.net servers and even to Twitter

10 active installs v1.4.2 PHP + WP 2.7.0+ Updated Jan 26, 2012
identicaoauthstatus-updatesstatus-nettwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Status.net Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Status.net has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "wp-statusnet" v1.4.2 plugin exhibits a mixed security posture, with some strong practices alongside significant areas of concern. On the positive side, the plugin has a completely clean vulnerability history, with no known CVEs. Furthermore, all SQL queries utilize prepared statements, and there are no bundled libraries, which are excellent security practices. However, the static analysis reveals several critical weaknesses. The plugin employs dangerous functions like `preg_replace` with the `/e` modifier and `unserialize`, which are notorious for leading to remote code execution vulnerabilities if not handled with extreme care. The taint analysis confirms this by identifying two flows with unsanitized paths, both flagged as high severity. The lack of any nonce checks or capability checks on potential entry points, even though the attack surface appears small (0 AJAX, 0 REST API, etc.), is a major oversight. This, combined with the extremely low percentage of properly escaped output (2%), creates a substantial risk of cross-site scripting (XSS) and other injection attacks if any of the identified unsanitized paths are ever reachable by user input. The absence of any recorded vulnerabilities in the past might be misleading; it could indicate either very thorough past code reviews, a lack of public disclosure, or simply that the existing vulnerabilities haven't been exploited or discovered yet. Given the presence of dangerous functions and unsanitized taint flows, alongside a complete lack of authentication and authorization checks on entry points and poor output escaping, the plugin's current security posture is concerning.

Key Concerns

  • High severity unsanitized taint flows detected
  • Use of dangerous functions (preg_replace(/e), unserialize)
  • No nonce checks detected
  • No capability checks detected
  • Very low percentage of properly escaped output
  • Unsanitized paths in taint analysis
Vulnerabilities
None known

WP-Status.net Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP-Status.net Release Timeline

v1.4.2Current
v1.4.0
v1.3.1
v1.3
Code Analysis
Analyzed Apr 16, 2026

WP-Status.net Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
61
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
7
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace('/[A-Z]|[0-9]+/e'wp-status-net.php:387
unserialize$options = unserialize($opt);wp-status-net.php:521
unserialize$options = unserialize($opt);wp-status-net.php:687
unserialize$options = unserialize($opt);wp-status-net.php:782

Output Escaping

2% escaped62 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wpstatusnet_options (wp-status-net.php:700)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Status.net Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionpublish_postwp-status-net.php:11
actioncomment_formwp-status-net.php:12
actionadmin_menuwp-status-net.php:938
Maintenance & Trust

WP-Status.net Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 26, 2012
PHP min version
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Status.net Developer Profile

Xavier Media

3 plugins · 70 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Status.net

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-statusnet/wp-statusnet.css/wp-content/plugins/wp-status-net/wp-statusnet.js
Script Paths
/wp-content/plugins/wp-statusnet/wp-statusnet.js
Version Parameters
wp-statusnet/wp-statusnet.css?ver=wp-statusnet/wp-statusnet.js?ver=

HTML / DOM Fingerprints

JS Globals
wp_statusnet_opt_in
FAQ

Frequently Asked Questions about WP-Status.net