Social Engage Plugin Security & Risk Analysis

wordpress.org/plugins/social-engage

Get your social network shares, likes, tweets, and view counts of posts from different social networks.

10 active installs v1.1.1 PHP + WP 4.0+ Updated Oct 30, 2018
social-countssocial-media-analyticssocial-metricssocial-sharingstats
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Social Engage Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Social Engage Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "social-engage" plugin v1.1.1 exhibits a mixed security posture. On the positive side, there are no known vulnerabilities (CVEs) recorded, and all SQL queries utilize prepared statements, indicating good practices in data handling. The absence of external HTTP requests and a minimal attack surface with zero identified unprotected entry points are also strengths. However, significant concerns arise from the static analysis. The presence of two dangerous functions, `ini_set` and `create_function`, poses a substantial risk if these are used in an insecure context. Furthermore, a critically low percentage of output escaping (16%) suggests a high likelihood of cross-site scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks on any potential entry points, though the attack surface is currently reported as zero, means that any future expansion of the attack surface without proper authorization checks would be immediately vulnerable. The limited file operation and absence of taint analysis results don't provide enough data to rule out potential file manipulation or code injection vulnerabilities comprehensively.

While the plugin has a clean vulnerability history, this could be due to its limited complexity or a lack of thorough past security audits. The core issues identified in the static analysis, particularly the dangerous functions and poor output escaping, represent direct and actionable security risks that need to be addressed. The absence of checks for nonces and capabilities is a foundational security gap that could be exploited if new entry points are introduced. Until these issues are resolved, the plugin should be considered to have a moderate to high risk profile, despite its lack of historical CVEs. The developer should prioritize addressing the insecure functions, implementing robust output escaping, and ensuring proper authorization checks are in place for all components.

Key Concerns

  • Dangerous functions (ini_set, create_function)
  • Low percentage of properly escaped output (16%)
  • No nonce checks implemented
  • No capability checks implemented
  • Bundled library (DataTables) potentially outdated
Vulnerabilities
None known

Social Engage Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Social Engage Plugin Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Social Engage Plugin Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
16
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

ini_setini_set('max_execution_time', 600); // 10 minutesinit.php:55
create_functionadd_action('widgets_init', create_function('', 'return register_widget("rfse_popular_posts_widget");init.php:226

Bundled Libraries

DataTables

Output Escaping

16% escaped19 total outputs
Attack Surface

Social Engage Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_enqueue_scriptsdashboard.php:12
actionadmin_enqueue_scriptsdashboard.php:23
actionadmin_menuinit.php:24
actionrfse_my_hourly_eventinit.php:49
actionwidgets_initinit.php:226
actionadmin_noticesinit.php:260
actionadmin_initinit.php:269
actionadmin_initinit.php:309

Scheduled Events 1

rfse_my_hourly_event
Maintenance & Trust

Social Engage Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedOct 30, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Social Engage Plugin Developer Profile

ravinder855

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Social Engage Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/social-engage/css/style.css/wp-content/plugins/social-engage/js/custom.js
Script Paths
/wp-content/plugins/social-engage/js/custom.js
Version Parameters
social-engage/style.css?ver=social-engage/custom.js?ver=

HTML / DOM Fingerprints

CSS Classes
rfse_widget_title
Data Attributes
data-widget-id
JS Globals
rfse_popular_posts_widget
REST Endpoints
/wp-json/social-engage/v1/get_social_count
FAQ

Frequently Asked Questions about Social Engage Plugin