QQWorld Share Security & Risk Analysis

wordpress.org/plugins/qqworld-share

Powerful share tools for SNS, MicroBlog, Blog, Bootmark, Mainly for China.

10 active installs v1.2.3 PHP + WP 3.0+ Updated Mar 7, 2015
chinasharetheme
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is QQWorld Share Safe to Use in 2026?

Generally Safe

Score 85/100

QQWorld Share has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'qqworld-share' plugin version 1.2.3 exhibits a mixed security posture. On the positive side, it has a minimal attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events that are exposed externally. Furthermore, all SQL queries are secured using prepared statements, and there are no recorded CVEs, indicating a potentially stable and less targeted plugin. The absence of external HTTP requests and file operations is also a good sign for security.

However, significant concerns arise from the static code analysis. The plugin uses the dangerous `unserialize` function four times, which is a major security risk as it can lead to Remote Code Execution if it processes untrusted input. Crucially, none of the 12 detected output operations are properly escaped. This means that any data rendered to the user could be vulnerable to Cross-Site Scripting (XSS) attacks, especially if the data originates from user input or external sources. The complete lack of nonce and capability checks is another critical weakness, leaving any functionality vulnerable to unauthorized access and manipulation, particularly in conjunction with the use of `unserialize`.

Given the absence of known vulnerabilities, the plugin might appear safe, but the internal code analysis reveals substantial latent risks. The reliance on `unserialize` without proper input validation or sanitization, coupled with pervasive unescaped output and the absence of authorization checks, creates a high probability of severe security issues such as RCE and XSS. The plugin's security is heavily dependent on the assumption that its internal functions are never called with untrusted data, which is an unrealistic and dangerous assumption in a web application environment. Therefore, while the attack surface is small and there are no known exploits, the potential for critical vulnerabilities is significant.

Key Concerns

  • Use of unserialize()
  • Output escaping is not properly implemented
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

QQWorld Share Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

QQWorld Share Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializeforeach (unserialize(QQWORLD_SHARE_PLUGIN_THTMES) as $key => $theme) :qqworld-share.php:91
unserializeforeach (unserialize(QQWORLD_SHARE_PLUGIN_SETTINGS) as $key => $share ):qqworld-share.php:106
unserialize$this->shareTo = is_array(get_option('qqworld-share-settings', QQWORLD_SHARE_PLUGIN_DEFAULT_SETTINGSqqworld-share.php:165
unserialize$settings = unserialize(QQWORLD_SHARE_PLUGIN_SETTINGS);qqworld-share.php:219

Output Escaping

0% escaped12 total outputs
Attack Surface

QQWorld Share Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedqqworld-share.php:51
actionadmin_menuqqworld-share.php:52
actionadmin_initqqworld-share.php:53
actionwp_enqueue_scriptsqqworld-share.php:54
filterthe_contentqqworld-share.php:55
filterplugin_row_metaqqworld-share.php:56
Maintenance & Trust

QQWorld Share Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedMar 7, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

QQWorld Share Developer Profile

Michael Wang

8 plugins · 660 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect QQWorld Share

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/qqworld-share/style/qqworld.css/wp-content/plugins/qqworld-share/style/wood.css/wp-content/plugins/qqworld-share/style/dark-metal.css/wp-content/plugins/qqworld-share/style/stone.css/wp-content/plugins/qqworld-share/style/red-earth.css/wp-content/plugins/qqworld-share/style/blueprint.css/wp-content/plugins/qqworld-share/style/light-metal.css/wp-content/plugins/qqworld-share/style/jiathis.css
Script Paths
/wp-content/plugins/qqworld-share/js/share.js
Version Parameters
qqworld-share/style/qqworld_share/js/share.js

HTML / DOM Fingerprints

CSS Classes
qqworld-share-style
Data Attributes
name="qqworld-share-theme"name="qqworld-share-settings[]"name="qqworld-share-posttypes[]"name="qqworld-share-mode"
JS Globals
qqworld_share_data
Shortcode Output
global $qqworld_share; echo $qqworld_share->get_share();
FAQ

Frequently Asked Questions about QQWorld Share