
WriteToThem Widget Security & Risk Analysis
wordpress.org/plugins/writetothemA widget which provides an entry point for mySociety's WriteToThem.com, now completely re-written.
Is WriteToThem Widget Safe to Use in 2026?
Generally Safe
Score 85/100WriteToThem Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin "writetothem" v2.1.1 exhibits a generally good security posture, primarily due to a lack of identified attack surface and a complete absence of known vulnerabilities. The static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential entry points for attackers. Furthermore, all SQL queries are properly prepared, and there are no external HTTP requests or bundled libraries that might introduce risks. This indicates a conscientious approach to development in these areas.
However, the analysis does highlight a few areas of concern. The presence of the `create_function` dangerous function is a significant red flag, as it can be a source of code injection vulnerabilities if not handled with extreme care. Additionally, the low percentage (20%) of properly escaped output suggests that there's a high likelihood of cross-site scripting (XSS) vulnerabilities. The absence of nonce and capability checks on all identified entry points, though the number of entry points is zero, would be a major concern if any were present, and their complete omission might indicate a lack of robust access control implementation. The vulnerability history being completely clear is a positive sign, but it could also mean the plugin hasn't been extensively tested or targeted.
In conclusion, while the plugin's lack of a broad attack surface and clean vulnerability history are commendable, the identified use of `create_function` and the poor output escaping warrant attention. These issues, if exploited, could lead to serious security compromises. The absence of explicit auth checks on all potential points of interaction is a weakness that, combined with the other issues, elevates the risk profile beyond what the clean CVE history might suggest.
Key Concerns
- Dangerous function 'create_function' used
- Low percentage of output escaping (20%)
- Missing nonce checks
- Missing capability checks
WriteToThem Widget Security Vulnerabilities
WriteToThem Widget Code Analysis
Dangerous Functions Found
Output Escaping
WriteToThem Widget Attack Surface
WordPress Hooks 1
Maintenance & Trust
WriteToThem Widget Maintenance & Trust
Maintenance Signals
Community Trust
WriteToThem Widget Alternatives
Democracy Poll
democracy-poll
WordPress polls plugin with multiple-choice, custom answers, cache compatibility, widgets, and shortcodes.
D64 LSR-Stopper
d64-lsr-stopper
Mit diesem Plugin verhinderst du Verlinkungen zu Medien, deren Verlage das Leistungsschutzrecht unterstützen bzw. in Anspruch nehmen.
Foodle Add-On for Democracy Poll
foodle-for-democracy-poll
Online polls (incl. mixed = check + radio) - use the flexible and interactive Doodle©-like front end options for display with voter categories.
MoveOn Campaigns
moveon-campaigns
Display and sign MoveOn.org campaign petitions on your site. Integrate directly into you theme or content, or use as a sidebar widget.
Poll And Survey plugin
poll-and-survey
This poll and survey plugin allows you to run any customized survey, poll or vote in your website. It could help you to get visitors/users openions ea …
WriteToThem Widget Developer Profile
7 plugins · 430 total installs
How We Detect WriteToThem Widget
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<form method="get" action="http://www.writetothem.com/"><input type="hidden" name="a" value="<div style=""><label for="text">