Hocus Pocus Buttons Security & Risk Analysis

wordpress.org/plugins/hocus-pocus-buttons

Automagically show or don't show buttons/links for social bookmarking sites, depending on the sites the user has visited lately.

10 active installs v0.5 PHP + WP 2.3+ Updated Jan 23, 2008
bookmarksidebarsocialwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hocus Pocus Buttons Safe to Use in 2026?

Generally Safe

Score 85/100

Hocus Pocus Buttons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 18yr ago
Risk Assessment

The "hocus-pocus-buttons" plugin v0.5 exhibits a strong adherence to some fundamental security practices. The static analysis reveals no direct attack surface through AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate an absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests. Taint analysis shows no identified flows, suggesting no immediate data injection risks. The plugin also has no recorded vulnerability history, which is a positive indicator of past stability.

However, a significant concern arises from the complete lack of output escaping. With three identified output points, the fact that none are properly escaped presents a substantial Cross-Site Scripting (XSS) risk. Any data displayed by this plugin without proper sanitization could potentially be exploited. Additionally, the absence of nonce checks and capability checks, while not directly exploitable given the lack of exposed entry points, represents a missed opportunity to build in defense-in-depth and could become a problem if future updates introduce new functionalities without addressing these checks.

In conclusion, while the plugin's current attack surface is minimal and it lacks known vulnerabilities, the critical deficiency in output escaping poses a tangible risk. The absence of nonce and capability checks, though not a direct vulnerability in this version, points to potential areas for improvement in overall security hardening. Developers should prioritize addressing the unescaped outputs.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Hocus Pocus Buttons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Hocus Pocus Buttons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Hocus Pocus Buttons Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedhp-buttons.php:154
Maintenance & Trust

Hocus Pocus Buttons Maintenance & Trust

Maintenance Signals

WordPress version tested2.3.2
Last updatedJan 23, 2008
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Hocus Pocus Buttons Developer Profile

hrosenhagen

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hocus Pocus Buttons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
hp_buttons
JS Globals
hp_buttons_css_defaulthp_buttons_css_blockhp_buttons_css_imagestheurlthetitlemode+4 more
FAQ

Frequently Asked Questions about Hocus Pocus Buttons