Popup to Share Security & Risk Analysis

wordpress.org/plugins/popup-to-share

Popup to Share shows sharing buttons for Facebook, Twitter, and Google plus in a pop-up.

10 active installs v1.3 PHP + WP 2.0+ Updated Dec 22, 2013
pop-uppopupsharesociablesocial
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Popup to Share Safe to Use in 2026?

Generally Safe

Score 85/100

Popup to Share has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "popup-to-share" v1.3 plugin exhibits a mixed security posture. On one hand, the absence of any recorded vulnerabilities in its history and the lack of direct SQL queries are positive indicators. Furthermore, the static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the plugin's attack surface. However, the static analysis does raise serious concerns regarding output escaping. One output was found to be improperly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if that output is rendered directly in the browser without proper sanitization. The taint analysis also identified a flow with an unsanitized path, which, while not classified as critical or high severity, warrants attention as it suggests a potential for unintended data manipulation or access. The plugin's lack of capability checks and nonce checks on any potential entry points (though none were identified) is a general weakness, as it doesn't implement standard WordPress security practices. In conclusion, while the plugin has a clean vulnerability history and a small attack surface, the identified output escaping issue and the unsanitized taint flow represent tangible risks that need to be addressed.

Key Concerns

  • Improper output escaping detected
  • Taint flow with unsanitized path
  • Missing nonce checks (general)
  • Missing capability checks (general)
Vulnerabilities
None known

Popup to Share Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Popup to Share Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<mplugin> (mplugin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Popup to Share Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menumplugin.php:159
actionwp_print_stylesmplugin.php:161
actionwp_print_scriptsmplugin.php:163
actionthe_contentmplugin.php:165
Maintenance & Trust

Popup to Share Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 22, 2013
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Popup to Share Developer Profile

Miguelo2008

2 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Popup to Share

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/popup-to-share/mplugin.css/wp-content/plugins/popup-to-share/mplugin.js
Script Paths
https://apis.google.com/js/plusone.js

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
id="form2"id="valor1"id="valor2"id="valor3"id="valor4"id="valor5"
FAQ

Frequently Asked Questions about Popup to Share