Adshares Security & Risk Analysis

wordpress.org/plugins/adshares

The easiest way to connect your site to the Adshares network.

10 active installs v0.1.3 PHP 5.5+ WP 4.0+ Updated Mar 11, 2019
adadsadsharesadvertisingbanners
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Adshares Safe to Use in 2026?

Generally Safe

Score 85/100

Adshares has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The adshares plugin v0.1.3 exhibits a strong security posture in several key areas based on the provided static analysis. Notably, there are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero total attack surface and zero unprotected entry points. This indicates that the plugin does not expose common vectors for exploitation through its core functionalities. Furthermore, the absence of dangerous functions and file operations is a positive sign, suggesting careful coding practices to avoid direct system manipulation.

However, the analysis reveals a significant concern regarding SQL queries. With one SQL query present and 0% using prepared statements, this represents a critical potential for SQL injection vulnerabilities. While the taint analysis shows no specific flows with unsanitized paths, the presence of raw SQL queries means that if any user-supplied data is ever incorporated into this query, it could be exploited. The output escaping also shows room for improvement, with only 33% of outputs properly escaped, indicating a potential for cross-site scripting (XSS) vulnerabilities.

The plugin's vulnerability history is clean, with no recorded CVEs, which is a strong positive. This suggests that in its past, it has not been a significant target or source of security issues. Combined with the lack of critical taint analysis findings and the presence of nonce and capability checks, the plugin demonstrates a foundational level of security awareness. Despite the lack of historical vulnerabilities, the raw SQL query and imperfect output escaping present tangible risks that require immediate attention to maintain a secure environment.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
Vulnerabilities
None known

Adshares Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Adshares Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
3
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

SQL Query Safety

0% prepared1 total queries

Output Escaping

33% escaped3 total outputs
Attack Surface

Adshares Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninitadshares.php:59
actioninitadshares.php:62
actionadmin_initsrc\Admin.php:100
actionadmin_menusrc\Admin.php:101
actionadmin_noticessrc\Admin.php:102
actionadmin_enqueue_scriptssrc\Admin.php:103
filterplugin_action_linkssrc\Admin.php:104
actionwp_headsrc\Plugin.php:128
filterthe_contentsrc\Plugin.php:129
filterget_the_excerptsrc\Plugin.php:130
Maintenance & Trust

Adshares Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMar 11, 2019
PHP min version5.5
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Adshares Developer Profile

adshares

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Adshares

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/adshares/assets/admin.css
Version Parameters
adshares/assets/admin.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-adshares-position-id
FAQ

Frequently Asked Questions about Adshares