All-Social FW Style Security & Risk Analysis

wordpress.org/plugins/all-social-fw-style-widget

Todos tus sitios web en un solo widget: Facebook, Twitter, Google Plus y FeedBurner.

10 active installs v0.1 PHP + WP 2.0.2+ Updated Oct 16, 2011
facebookgoogle-plussocialtwitterwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is All-Social FW Style Safe to Use in 2026?

Generally Safe

Score 85/100

All-Social FW Style has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin "all-social-fw-style-widget" v0.1 exhibits a mixed security posture. On one hand, the static analysis reveals a complete lack of known CVEs and a clean vulnerability history, suggesting a history of diligent security practices or a lack of prior exploitation. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are good indicators of a secure codebase.

However, significant concerns arise from the code signals. The presence of `create_function` is a major red flag, as it is deprecated and can lead to code injection vulnerabilities. Crucially, the analysis shows that 100% of the output is not properly escaped, posing a severe risk for Cross-Site Scripting (XSS) vulnerabilities. While the attack surface appears small with no apparent entry points for AJAX, REST API, shortcodes, or cron events, this could be misleading if the plugin relies on other means to interact with WordPress or external services that are not captured by these static analysis metrics.

In conclusion, the plugin's lack of historical vulnerabilities is a positive sign, but the critical issues identified in the static analysis, particularly the unescaped output and the use of `create_function`, introduce substantial security risks that require immediate attention. The small attack surface is overshadowed by the severe weaknesses in output sanitization and the use of a dangerous function.

Key Concerns

  • 100% of outputs are not properly escaped
  • Use of dangerous function: create_function
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

All-Social FW Style Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

All-Social FW Style Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
30
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("All_Social_FW_Style");') );wd_all_social.php:109

Output Escaping

0% escaped30 total outputs
Attack Surface

All-Social FW Style Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initwd_all_social.php:109
actionwp_headwd_all_social.php:115
Maintenance & Trust

All-Social FW Style Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 16, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

All-Social FW Style Developer Profile

Angelverde

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect All-Social FW Style

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/all-social-fw-style-widget/wd_all_social.css

HTML / DOM Fingerprints

CSS Classes
followcfmyasideinnerboxboxtwittertwitter-follow-buttonc_plusoneboxgplus+3 more
Data Attributes
data-lang="es"
JS Globals
platform.twitter.com/widgets.js
FAQ

Frequently Asked Questions about All-Social FW Style