Hover Pin-It Security & Risk Analysis

wordpress.org/plugins/hover-pin-it

Adds a Pinterest "Pin It" button to images on your site, with eye catching hover effects.

40 active installs v1.1 PHP + WP 3.0.1+ Updated Oct 4, 2012
imagepinterestpostsshare
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hover Pin-It Safe to Use in 2026?

Generally Safe

Score 85/100

Hover Pin-It has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "hover-pin-it" plugin version 1.1 presents a mixed security posture. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and has no recorded vulnerability history, suggesting a generally well-maintained codebase. The attack surface, consisting of two shortcodes, is relatively small and, importantly, appears to lack direct unprotected entry points based on the static analysis. There are also no critical code signals like dangerous functions, file operations, or external HTTP requests, and the taint analysis found no issues, which are all favorable indicators.

However, a significant concern arises from the complete lack of output escaping. With four identified output points and none being properly escaped, this creates a high risk for Cross-Site Scripting (XSS) vulnerabilities. Attackers could potentially inject malicious scripts through user-supplied data that is then displayed on the website. Additionally, the absence of nonce checks and capability checks, while not directly tied to an attack vector in this specific analysis, indicates a potential for privilege escalation or unauthorized actions if the plugin were to evolve or interact with more sensitive functionalities in the future. The overall conclusion is that while the plugin avoids common pitfalls like raw SQL and known vulnerabilities, the critical lack of output escaping renders it susceptible to XSS attacks, demanding immediate attention.

Key Concerns

  • 0% output escaping
  • 0 nonce checks
  • 0 capability checks
Vulnerabilities
None known

Hover Pin-It Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hover Pin-It Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Hover Pin-It Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[nopinit] hover-pin-it.php:94
[dopinit] hover-pin-it.php:98
WordPress Hooks 6
actionwp_enqueue_scriptshover-pin-it.php:13
filterthe_contenthover-pin-it.php:22
actionwp_headhover-pin-it.php:65
actionadmin_inithover-pin-it.php:105
actionadmin_menuhover-pin-it.php:106
filterplugin_action_linkshover-pin-it.php:107
Maintenance & Trust

Hover Pin-It Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedOct 4, 2012
PHP min version
Downloads8K

Community Trust

Rating86/100
Number of ratings3
Active installs40
Developer Profile

Hover Pin-It Developer Profile

michellemacphearson

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hover Pin-It

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hover-pin-it/hover-pin-it.js
Script Paths
/wp-content/plugins/hover-pin-it/hover-pin-it.js

HTML / DOM Fingerprints

CSS Classes
pin-it
JS Globals
jQuery().pinit
Shortcode Output
[nopinit][dopinit]
FAQ

Frequently Asked Questions about Hover Pin-It