Hoverswap Security & Risk Analysis

wordpress.org/plugins/hoverswap

Swaps the content of a tag with the content of its title when the user hovers over it.

10 active installs v1.0 PHP + WP 2.1+ Updated Jan 31, 2012
hoverswaptexttitle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hoverswap Safe to Use in 2026?

Generally Safe

Score 85/100

Hoverswap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin 'hoverswap' v1.0 exhibits a seemingly strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events suggests a very limited attack surface, which is a positive indicator. Furthermore, the code signals show no dangerous functions, no raw SQL queries (all are prepared), no file operations, no external HTTP requests, and no bundled libraries. This indicates good development practices in these areas.

However, a significant concern arises from the output escaping analysis. With 2 total outputs and 0% properly escaped, this indicates a potential for Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that is not properly escaped can be leveraged by attackers to inject malicious scripts. The absence of capability checks and nonce checks, combined with zero taint flows, might be a consequence of the limited attack surface, but it also means that even if an entry point were discovered, there would be no built-in authorization or CSRF protection.

The vulnerability history is also clean, with zero recorded CVEs. This is a positive sign, suggesting the plugin has not historically had exploitable flaws. However, it's crucial to remember that a clean history doesn't guarantee future security, especially when other potential weaknesses like unescaped output exist. In conclusion, while 'hoverswap' v1.0 benefits from a small attack surface and good practices in data handling (SQL) and external interactions, the complete lack of output escaping presents a notable risk that should be addressed.

Key Concerns

  • Output escaping is not properly implemented
Vulnerabilities
None known

Hoverswap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Hoverswap Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Hoverswap Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Hoverswap Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headhoverswap.php:34
actionwp_headtrunk\hoverswap.php:34
Maintenance & Trust

Hoverswap Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 31, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Hoverswap Developer Profile

Randy Hunt

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hoverswap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
over
HTML Comments
hoverswap
FAQ

Frequently Asked Questions about Hoverswap