Official Markerly Widget Security & Risk Analysis

wordpress.org/plugins/official-markerly-widget

Instant sharing on text highlight/selection to Facebook/Twitter and more!

30 active installs v1.4 PHP + WP 3.3+ Updated Aug 7, 2015
addthisaddtoanymicro-sharingsharingtext-analytics
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Official Markerly Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Official Markerly Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The official-markerly-widget plugin version 1.4 exhibits a surprisingly clean static analysis profile, with no apparent entry points like AJAX handlers, REST API routes, shortcodes, or cron events. This significantly limits the potential attack surface. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests, along with the exclusive use of prepared statements for SQL queries, are strong indicators of good security development practices. The vulnerability history is also clean, with no recorded CVEs, which is a positive sign. However, a critical concern arises from the total lack of output escaping. With seven total outputs identified and none properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Attackers could potentially inject malicious scripts through user-supplied data that is then displayed on the frontend without proper sanitization, leading to session hijacking, credential theft, or defacement. The absence of nonce and capability checks, while not a direct risk in itself due to the lack of entry points, would become a severe issue if any new entry points were introduced in future versions without corresponding security measures.

Key Concerns

  • All output is unescaped
  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

Official Markerly Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Official Markerly Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Official Markerly Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initmarkerly-plugin.php:25
actionadmin_menumarkerly-plugin.php:26
actionwp_headmarkerly-plugin.php:27
Maintenance & Trust

Official Markerly Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedAug 7, 2015
PHP min version
Downloads12K

Community Trust

Rating60/100
Number of ratings2
Active installs30
Developer Profile

Official Markerly Widget Developer Profile

markerlyINC

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Official Markerly Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://files.markerly.com/markerly-cdn.js

HTML / DOM Fingerprints

CSS Classes
color-codesharing-options
Data Attributes
id="colorselector"data-colorpicker-initialized
JS Globals
markerly_settings
FAQ

Frequently Asked Questions about Official Markerly Widget