Jumbo Share Security & Risk Analysis

wordpress.org/plugins/jumbo-share

Add Mashable.com like social share bar to your web site.

10 active installs v1.0.0 PHP + WP 3.6+ Updated Dec 6, 2015
mashablesocial-media-networkssocial-media-pop-upsocial-media-sharingsocial-media-widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jumbo Share Safe to Use in 2026?

Generally Safe

Score 85/100

Jumbo Share has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "jumbo-share" plugin version 1.0.0 exhibits a concerning security posture due to several critical vulnerabilities identified in the static analysis. A significant portion of its attack surface, specifically 3 out of 4 entry points, lacks authentication checks, making them susceptible to unauthorized access and manipulation. Furthermore, the presence of a dangerous `unserialize` function without any apparent sanitization or validation introduces a high risk of remote code execution if attacker-controlled data is passed to it. While the plugin uses prepared statements for its SQL queries, the low percentage (24%) of properly escaped output is a major concern, potentially leading to cross-site scripting (XSS) vulnerabilities. The absence of nonce and capability checks on all entry points further exacerbates these risks, as it allows for actions to be performed without proper verification. The lack of any recorded vulnerabilities in its history might suggest a lack of targeted attacks or a limited user base, rather than inherent security, especially given the current findings.

Key Concerns

  • Unprotected AJAX handlers
  • Dangerous unserialize function
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
  • Flows with unsanitized paths
Vulnerabilities
None known

Jumbo Share Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Jumbo Share Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
2 prepared
Unescaped Output
45
14 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserializeif($this->settings == '') $this->settings = unserialize($default_settings);public\class-jumbo-share-public.php:58

SQL Query Safety

100% prepared2 total queries

Output Escaping

24% escaped59 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
jumbo_share_stats (public\class-jumbo-share-public.php:205)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Jumbo Share Attack Surface

Entry Points4
Unprotected3

AJAX Handlers 3

authwp_ajax_jumbo_share_purge_cacheincludes\class-jumbo-share.php:173
authwp_ajax_jumbo_share_statsincludes\class-jumbo-share.php:192
noprivwp_ajax_jumbo_share_statsincludes\class-jumbo-share.php:193

Shortcodes 1

[jumbo-share] public\class-jumbo-share-public.php:59
WordPress Hooks 11
filterwpsf_register_settings_jumboshareadmin\settings\settings.php:23
actionplugins_loadedincludes\class-jumbo-share.php:153
actionadmin_enqueue_scriptsincludes\class-jumbo-share.php:170
actionadmin_enqueue_scriptsincludes\class-jumbo-share.php:171
actionadmin_menuincludes\class-jumbo-share.php:172
actionwp_enqueue_scriptsincludes\class-jumbo-share.php:189
actionwp_enqueue_scriptsincludes\class-jumbo-share.php:190
filterthe_contentincludes\class-jumbo-share.php:191
actionadmin_initincludes\wp-settings-framework.php:82
actionadmin_noticesincludes\wp-settings-framework.php:87
actionadmin_enqueue_scriptsincludes\wp-settings-framework.php:88
Maintenance & Trust

Jumbo Share Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedDec 6, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Jumbo Share Developer Profile

WPManiax

4 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jumbo Share

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jumbo-share/admin/css/jumbo-share-admin.css/wp-content/plugins/jumbo-share/admin/js/jumbo-share-admin.js/wp-content/plugins/jumbo-share/public/css/jumbo-share-public.css/wp-content/plugins/jumbo-share/public/js/jumbo-share-public.js
Script Paths
/wp-content/plugins/jumbo-share/admin/js/jumbo-share-admin.js/wp-content/plugins/jumbo-share/public/js/jumbo-share-public.js
Version Parameters
jumbo-share-admin.css?ver=jumbo-share-admin.js?ver=jumbo-share-public.css?ver=jumbo-share-public.js?ver=

HTML / DOM Fingerprints

CSS Classes
jumbo-share-social-bar
Data Attributes
data-share-url
JS Globals
jumbo_share
Shortcode Output
[jumbo_share_buttons]
FAQ

Frequently Asked Questions about Jumbo Share