CMS Vote Up Social CMS News Security & Risk Analysis

wordpress.org/plugins/cms-vote-up-social-cms-news-button

A must have social CMS website news button for Wordpress user (blogger). This button will enable your visitor to vote for your website's article …

10 active installs v1.1 PHP + WP 2.7+ Updated May 11, 2011
diggfacebookgoogle-buzzstumbleupontwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CMS Vote Up Social CMS News Safe to Use in 2026?

Generally Safe

Score 85/100

CMS Vote Up Social CMS News has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin 'cms-vote-up-social-cms-news-button' v1.1 exhibits a generally strong security posture based on the provided static analysis. The complete absence of entry points such as AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the use of prepared statements for all SQL queries and the absence of dangerous functions, file operations, or external HTTP requests are positive security indicators. However, a critical concern arises from the fact that 100% of the identified output operations are not properly escaped. This lack of output sanitization represents a significant risk for Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the web page. The vulnerability history shows no recorded CVEs, which, combined with the limited attack surface and good coding practices in other areas, suggests a potentially well-maintained plugin. However, the unescaped output is a glaring weakness that needs immediate attention, as it bypasses the protection offered by other secure coding practices. In conclusion, while the plugin demonstrates strengths in limiting its attack surface and securing database interactions, the prevalent lack of output escaping presents a critical security flaw that outweighs these positives.

Key Concerns

  • 100% of output operations are not properly escaped
Vulnerabilities
None known

CMS Vote Up Social CMS News Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CMS Vote Up Social CMS News Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

CMS Vote Up Social CMS News Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterthe_contentcms-vote-up-social-news-button.php:76
actionadmin_menucms-vote-up-social-news-button.php:181
actionadmin_initcms-vote-up-social-news-button.php:182
Maintenance & Trust

CMS Vote Up Social CMS News Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMay 11, 2011
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CMS Vote Up Social CMS News Developer Profile

cmsvoteup

3 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CMS Vote Up Social CMS News

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/cms-vote-up-social-cms-news-button/js/vote-up.js

HTML / DOM Fingerprints

Data Attributes
id="style"id="position_button"name="cms_vote_up_social_news_button_options[style]"name="cms_vote_up_social_news_button_options[position_button]"name="cms_vote_up_social_news_button_options[own_css]"
Shortcode Output
add_cms_vote_up_social_news_button();
FAQ

Frequently Asked Questions about CMS Vote Up Social CMS News