flodjiShare Security & Risk Analysis

wordpress.org/plugins/flodjishare

Just install flodjiShare to enable Social Sharing on your Wordpress site.

20 active installs v5.2 PHP + WP 5.0+ Updated Jan 28, 2019
facebooksharesocialtwitterxing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is flodjiShare Safe to Use in 2026?

Generally Safe

Score 85/100

flodjiShare has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "flodjishare" v5.2 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of known CVEs, dangerous functions, raw SQL queries, and external HTTP requests is highly commendable. The plugin also demonstrates good practices in handling output, with 91% of outputs being properly escaped, and it implements a capability check for its single entry point. The fact that there are no unpatched vulnerabilities and no recorded past vulnerabilities further reinforces this positive outlook.

However, a few areas warrant attention. The taint analysis revealed one flow with unsanitized paths. While classified as not critical or high, unsanitized paths can sometimes lead to subtle but exploitable vulnerabilities, particularly if the data originates from user input. Furthermore, the plugin has zero nonce checks. For any entry point that might process user-supplied data, especially AJAX or REST API endpoints (though none are present here), the absence of nonce checks can expose the plugin to Cross-Site Request Forgery (CSRF) attacks. The single shortcode, which represents the entire attack surface, is the sole entry point and does not appear to have explicit nonce checks, which is a potential weakness.

In conclusion, "flodjishare" v5.2 has a solid foundation with many security best practices implemented. The most significant concern is the unsanitized path flow in the taint analysis and the lack of nonce checks, which could be exploited under specific circumstances. The vulnerability history is excellent, suggesting a mature and well-maintained codebase. Addressing the unsanitized path and considering nonce checks for its shortcode would further enhance its security.

Key Concerns

  • Taint flow with unsanitized path
  • Missing nonce checks on entry points
Vulnerabilities
None known

flodjiShare Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

flodjiShare Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
33
339 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

91% escaped372 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<klick> (klick.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

flodjiShare Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[flodjishare] flodjishare.php:28
WordPress Hooks 15
actioninitflodjishare.php:14
actionwp_footerflodjishare.php:25
filterthe_contentflodjishare.php:30
filtermanage_posts_columnsflodjishare.php:34
filtermanage_pages_columnsflodjishare.php:35
actionmanage_posts_custom_columnflodjishare.php:36
actionmanage_pages_custom_columnflodjishare.php:37
filtermanage_edit-post_sortable_columnsflodjishare.php:38
filtermanage_edit-page_sortable_columnsflodjishare.php:39
filterrequestflodjishare.php:40
actionwp_footerflodjishare.php:53
actionwp_headflodjishare.php:696
actionadmin_menuflodjishare.php:701
actionadmin_initflodjishare.php:704
actionadmin_enqueue_scriptsflodjishare.php:761
Maintenance & Trust

flodjiShare Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 28, 2019
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs20
Developer Profile

flodjiShare Developer Profile

Florian Leyrer

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect flodjiShare

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/flodjishare/js/flodjishare.js/wp-content/plugins/flodjishare/css/flodjishare.css
Script Paths
/wp-content/plugins/flodjishare/js/flodjishare.js
Version Parameters
flodjishare/style.css?ver=flodjishare/js/flodjishare.js?ver=

HTML / DOM Fingerprints

CSS Classes
fsmainfsbtncenterfsbtnfloatfsbarflatmixfsspanflatmixfsbasefscounter+28 more
Data Attributes
data-fssocialdata-fsactivedata-fssizedata-fscolordata-fscountdata-fslink+3 more
JS Globals
window.popup
Shortcode Output
<div class="fsmain<p style="font-size:<a class="fsfb<a class="fsfl
FAQ

Frequently Asked Questions about flodjiShare