Storefront Product Sharing Security & Risk Analysis

wordpress.org/plugins/storefront-product-sharing

Add attractive social sharing icons for Facebook, Twitter, Pinterest and Email to your product pages.

5K active installs v1.0.6 PHP + WP 4.0+ Updated Aug 27, 2020
ecommercesharingsocialstorefrontwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Storefront Product Sharing Safe to Use in 2026?

Generally Safe

Score 85/100

Storefront Product Sharing has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "storefront-product-sharing" plugin version 1.0.6 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events suggests a minimal attack surface, which is further bolstered by the complete lack of unprotected entry points. The code signals are also highly positive, with no dangerous functions, SQL queries utilizing prepared statements, file operations, or external HTTP requests. Notably, the plugin also avoids bundled libraries, mitigating risks associated with outdated third-party code. The presence of a high percentage of properly escaped output is a good practice, although the single unescaped output warrants attention.

While the taint analysis shows no critical or high severity flows, and there is no recorded vulnerability history, the absence of nonce and capability checks across all entry points is a significant concern. Even with a seemingly small attack surface, the lack of these fundamental WordPress security mechanisms leaves potential openings for attackers, especially if new functionalities are added in future versions without proper security considerations. The plugin's strengths lie in its clean code and lack of known vulnerabilities, but its weaknesses stem from the missing authentication and authorization checks on its limited entry points.

Key Concerns

  • Unescaped output found
  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
Vulnerabilities
None known

Storefront Product Sharing Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Storefront Product Sharing Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

90% escaped10 total outputs
Attack Surface

Storefront Product Sharing Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitstorefront-product-sharing.php:91
actioninitstorefront-product-sharing.php:93
actionwp_enqueue_scriptsstorefront-product-sharing.php:172
actionwoocommerce_after_single_product_summarystorefront-product-sharing.php:173
filterbody_classstorefront-product-sharing.php:174
filterstorefront_customizer_morestorefront-product-sharing.php:177
actionadmin_noticesstorefront-product-sharing.php:179
Maintenance & Trust

Storefront Product Sharing Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedAug 27, 2020
PHP min version
Downloads274K

Community Trust

Rating78/100
Number of ratings14
Active installs5K
Developer Profile

Storefront Product Sharing Developer Profile

WooCommerce

36 plugins · 4.7M total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
234 days
View full developer profile
Detection Fingerprints

How We Detect Storefront Product Sharing

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/storefront-product-sharing/assets/css/style.css
Version Parameters
storefront-product-sharing/assets/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
storefront-product-sharingtwitterfacebookpinterestemail
FAQ

Frequently Asked Questions about Storefront Product Sharing