Hover Sound Security & Risk Analysis

wordpress.org/plugins/hover-sound

You can introduce the behavior of playing sound by hovering mouse pointer over an HTML element and stopping the sound by moving the mouse pointer away …

40 active installs v1.0.0 PHP + WP 3.3.0+ Updated Mar 7, 2012
audiocursorhovermousesound
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hover Sound Safe to Use in 2026?

Generally Safe

Score 85/100

Hover Sound has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "hover-sound" v1.0.0 plugin presents a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no raw SQL queries, and no external HTTP requests. The complete absence of known CVEs and historical vulnerabilities is also a strong indicator of good security practices in past development cycles. However, significant concerns arise from the lack of output escaping. With 0% of outputs properly escaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities, allowing malicious code to be injected into the user's browser through the plugin's output. The absence of nonce and capability checks on its single shortcode entry point, while not explicitly listed as unprotected in the attack surface data, still raises potential issues if the shortcode's functionality is sensitive and could be triggered without proper authorization. The lack of taint analysis data is a neutral observation, suggesting no obvious flows were detected, but it's not a guarantee of absolute safety. Overall, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL, the critical flaw in output escaping creates a substantial risk that overshadows its strengths.

Key Concerns

  • Unescaped output detected
  • Missing capability checks on shortcode
  • Missing nonce checks on shortcode
Vulnerabilities
None known

Hover Sound Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Hover Sound Release Timeline

v1.0.0Current
Code Analysis
Analyzed Mar 16, 2026

Hover Sound Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Hover Sound Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[hoversound] HoverSound.php:59
WordPress Hooks 4
actioninitHoverSound.php:19
filterthe_contentHoverSound.php:33
filterwidget_textHoverSound.php:60
actionwp_headHoverSound.php:65
Maintenance & Trust

Hover Sound Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMar 7, 2012
PHP min version
Downloads5K

Community Trust

Rating20/100
Number of ratings1
Active installs40
Developer Profile

Hover Sound Developer Profile

aueda

3 plugins · 250 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hover Sound

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hover-sound/HoverSound.js
Script Paths
/wp-content/plugins/hover-sound/HoverSound.js

HTML / DOM Fingerprints

JS Globals
hoverSound_plugin_URL
Shortcode Output
<input type="hidden" id="hoversound_([0-9]+)" value="(.*)">
FAQ

Frequently Asked Questions about Hover Sound