PalDrop Dropbox Shop Security & Risk Analysis

wordpress.org/plugins/paldrop-dropbox-shop

PalDrop allows you to add a simple and fast payment button for your Dropbox files! It combines your Paypal email with your Dropbox account and enables …

10 active installs v3.2.0 PHP + WP 2.7.0+ Updated Unknown
adminlinkswidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PalDrop Dropbox Shop Safe to Use in 2026?

Generally Safe

Score 100/100

PalDrop Dropbox Shop has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'paldrop-dropbox-shop' plugin, version 3.2.0, exhibits a mixed security posture. On the positive side, the static analysis reveals no obvious critical vulnerabilities such as dangerous functions, raw SQL queries, file operations, external requests, or bundled libraries. The absence of known CVEs in its history further suggests a generally well-maintained codebase in terms of historical patching.

However, significant concerns arise from the taint analysis, which identified four flows with unsanitized paths, although none were classified as critical or high severity. More alarmingly, a substantial portion of the output escaping (0%) is not properly handled, indicating a high risk of cross-site scripting (XSS) vulnerabilities. The lack of capability checks and nonce checks across all entry points, combined with zero protected entry points, means that any interaction with the plugin's functionality is potentially accessible without proper authorization or protection, creating a broad attack surface.

In conclusion, while the plugin's historical security record and absence of known critical flaws are strengths, the identified taint flows and, most critically, the complete lack of output escaping and authorization checks on its entry points, present significant security weaknesses. These issues necessitate immediate attention to prevent potential exploitation.

Key Concerns

  • 0% output escaping
  • 4 unsanitized paths in taint flows
  • 0% protected entry points
  • 0 capability checks
  • 0 nonce checks
Vulnerabilities
None known

PalDrop Dropbox Shop Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PalDrop Dropbox Shop Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
paldrop_edit_settings (paldrop.php:22)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

PalDrop Dropbox Shop Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menupaldrop.php:289
filtermedia_buttons_contextpaldrop.php:290
actionplugins_loadedpaldrop.php:293
Maintenance & Trust

PalDrop Dropbox Shop Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PalDrop Dropbox Shop Developer Profile

tradebit

3 plugins · 30 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PalDrop Dropbox Shop

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/paldrop-dropbox-shop/paldrop.php
Version Parameters
paldrop-dropbox-shop/paldrop.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PalDrop Dropbox Shop