Share a Draft Security & Risk Analysis

wordpress.org/plugins/shareadraft

Share private preview links to your drafts

3K active installs v1.5 PHP + WP 4.0+ Updated Apr 7, 2021
draftdraftspostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Share a Draft Safe to Use in 2026?

Generally Safe

Score 85/100

Share a Draft has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The 'shareadraft' plugin v1.5 exhibits a generally positive security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points suggests a minimal attack surface. Furthermore, the analysis indicates no dangerous functions, no SQL queries that are not prepared, and no taint flows with unsanitized paths, all of which are strong indicators of secure coding practices. The presence of nonce and capability checks, though limited, is also a positive sign.

However, a significant concern arises from the output escaping. With 35% of outputs properly escaped, it means a substantial portion (65%) of outputs may be vulnerable to Cross-Site Scripting (XSS) attacks. This lack of consistent output sanitization is the most prominent risk identified in the code analysis and presents a clear avenue for attackers to inject malicious scripts. The plugin's vulnerability history is clean, with no recorded CVEs, which is excellent. This, combined with the lack of critical or high-severity taint flows, suggests that past security practices have been effective. Nevertheless, the identified XSS risk warrants attention.

In conclusion, 'shareadraft' v1.5 benefits from a small attack surface and secure handling of database operations and sensitive code execution paths. Its clean vulnerability history is a testament to this. The primary weakness lies in the insufficient output escaping, which could lead to XSS vulnerabilities. While not currently exploited according to the history, this represents a tangible risk that should be addressed.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Share a Draft Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Share a Draft Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
9 escaped
Nonce Checks
3
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

35% escaped26 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
output_existing_menu_sub_admin_page (shareadraft.php:229)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Share a Draft Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitshareadraft.php:19
actionadmin_menushareadraft.php:24
filterthe_postsshareadraft.php:25
filterposts_resultsshareadraft.php:26
actionadmin_headshareadraft.php:44
actionadmin_headshareadraft.php:45
Maintenance & Trust

Share a Draft Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedApr 7, 2021
PHP min version
Downloads64K

Community Trust

Rating74/100
Number of ratings11
Active installs3K
Developer Profile

Share a Draft Developer Profile

Automattic

213 plugins · 19.2M total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
1384 days
View full developer profile
Detection Fingerprints

How We Detect Share a Draft

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shareadraft/css/admin.css/wp-content/plugins/shareadraft/js/admin.js
Script Paths
/wp-content/plugins/shareadraft/js/admin.js

HTML / DOM Fingerprints

CSS Classes
shareadraft-admin-page
Data Attributes
data-post-iddata-share-keydata-extend-noncedata-delete-nonce
JS Globals
shareadraft_admin_opts
FAQ

Frequently Asked Questions about Share a Draft