Select to Share Security & Risk Analysis

wordpress.org/plugins/select-to-share

Show a nice pop-up menu on text selection for sharing on Facebook, Twitter and e-mail...

10 active installs v1.0.1 PHP + WP 3.8+ Updated Dec 17, 2015
emailselect-to-shareselectionsharertwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Select to Share Safe to Use in 2026?

Generally Safe

Score 85/100

Select to Share has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of the 'select-to-share' plugin v1.0.1 reveals a strong security posture with no identified vulnerabilities in the analyzed code. The plugin demonstrates excellent security practices, including the complete absence of dangerous functions, 100% utilization of prepared statements for SQL queries, and proper output escaping. Furthermore, there are no file operations or external HTTP requests, and critical security checks like nonce and capability checks are not applicable due to the absence of exploitable entry points. Taint analysis also shows no unsanitized paths or critical/high severity flows, indicating robust input handling.

The vulnerability history further reinforces this positive assessment, showing zero known CVEs, no unpatched vulnerabilities, and no recorded common vulnerability types. This lack of historical security incidents suggests a well-maintained and secure codebase over time. While the plugin currently presents an exceptionally low risk profile, it's important to acknowledge that the absence of any entry points (AJAX, REST API, shortcodes, cron events) is a significant factor in this assessment. If functionality were to be added in the future, these areas would require diligent security reviews.

In conclusion, the 'select-to-share' plugin v1.0.1 exhibits an outstanding security profile based on the provided static analysis and historical data. Its adherence to secure coding principles is commendable, and there are no immediate security concerns. The plugin's current design, with no identifiable attack surface, inherently minimizes potential risks. However, as with any software, ongoing vigilance and regular security audits are always recommended, especially if future updates introduce new features or entry points.

Vulnerabilities
None known

Select to Share Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Select to Share Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Select to Share Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_loadedselect-to-share.php:41
actionplugins_loadedselect-to-share.php:68
actioninitselect-to-share.php:70
Maintenance & Trust

Select to Share Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 17, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Select to Share Developer Profile

Sibin Grasic

6 plugins · 1K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Select to Share

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/select-to-share/assets/css/select-to-share.css/wp-content/plugins/select-to-share/assets/js/select-to-share.js
Script Paths
/wp-content/plugins/select-to-share/assets/js/select-to-share.js
Version Parameters
select-to-share/assets/css/select-to-share.css?ver=select-to-share/assets/js/select-to-share.js?ver=

HTML / DOM Fingerprints

CSS Classes
sgi-ssr-popoversgi-ssr-shares
Data Attributes
data-sgi-ssr-share
JS Globals
SGI_SSR
FAQ

Frequently Asked Questions about Select to Share