Post Share Count Security & Risk Analysis

wordpress.org/plugins/post-share-count

Show twitter and facebook share count.

10 active installs v0.5.1 PHP + WP 3.0+ Updated Feb 1, 2015
countersharetwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Share Count Safe to Use in 2026?

Generally Safe

Score 85/100

Post Share Count has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "post-share-count" plugin version 0.5.1 presents a mixed security posture. On one hand, the static analysis reveals a very small attack surface with zero identified entry points (AJAX, REST API, shortcodes, cron events) that are unprotected. This indicates a potentially strong focus on restricting access to plugin functionalities. Furthermore, there are no recorded vulnerabilities in its history, suggesting a stable and well-maintained codebase in the past.

However, significant concerns arise from the code signals. The plugin makes external HTTP requests, which can be a vector for various attacks if not handled securely. More critically, the single SQL query is not using prepared statements, creating a direct risk of SQL injection. Additionally, none of the outputs are properly escaped, posing a substantial risk for cross-site scripting (XSS) vulnerabilities. The complete absence of nonce and capability checks on any potential entry points further exacerbates these risks, as it implies that any user, regardless of their role or permissions, could potentially interact with and exploit these insecure functionalities.

In conclusion, while the plugin has a clean vulnerability history and a seemingly limited attack surface, the insecure handling of SQL queries and output escaping, coupled with the lack of crucial security checks, creates notable vulnerabilities. The external HTTP requests also warrant careful consideration. The absence of any recorded CVEs is a positive sign, but it does not negate the immediate risks identified in the static analysis of this specific version.

Key Concerns

  • SQL queries not using prepared statements
  • Outputs not properly escaped
  • No nonce checks detected
  • No capability checks detected
  • External HTTP requests present
Vulnerabilities
None known

Post Share Count Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Share Count Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
5
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Post Share Count Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Post Share Count Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedFeb 1, 2015
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Post Share Count Developer Profile

zviryatko

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Share Count

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-share-count/css/style.css/wp-content/plugins/post-share-count/js/script.js
Script Paths
/wp-content/plugins/post-share-count/js/script.js
Version Parameters
post-share-count/css/style.css?ver=post-share-count/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
share-linkgenericongenericon-sharegenericon-twittergenericon-facebookgenericon-pinterestgenericon-googleplusgenericon-linkedin
FAQ

Frequently Asked Questions about Post Share Count