Text Hover Security & Risk Analysis

wordpress.org/plugins/text-hover

Add hover text (aka tooltips) to content in posts. Handy for providing explanations of names, terms, phrases, abbreviations, and acronyms.

2K active installs v4.2 PHP + WP 4.9+ Updated Mar 23, 2022
abbreviationsacronymshelptermstooltips
85
A · Safe
CVEs total1
Unpatched0
Last CVEApr 9, 2022
Safety Verdict

Is Text Hover Safe to Use in 2026?

Generally Safe

Score 85/100

Text Hover has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Apr 9, 2022Updated 4yr ago
Risk Assessment

The "text-hover" plugin v4.2 exhibits a mixed security posture. On the positive side, the plugin has a minimal attack surface with no discoverable AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are good security practices. However, several concerns emerge from the static analysis. The presence of the `unserialize` function is a significant red flag, as it can be a vector for object injection vulnerabilities if the serialized data is not strictly controlled. The output escaping rate is also a concern, with 61% of outputs not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks, despite the presence of a capability check, suggests potential for CSRF or unauthorized actions if an entry point were to be discovered.

The vulnerability history indicates a past medium-severity XSS vulnerability, which aligns with the output escaping issues found in the current analysis. The fact that this vulnerability is no longer unpatched is positive, but it highlights a recurring theme of input sanitization and output escaping weaknesses. The overall conclusion is that while the plugin has a small attack surface and uses secure practices for database interactions, the presence of `unserialize` and poor output escaping, coupled with a history of XSS, warrants careful consideration. The plugin is not inherently insecure due to its limited entry points, but the identified code signals and past vulnerabilities suggest a need for more robust input validation and output encoding.

Key Concerns

  • Dangerous function unserialize found
  • Low output escaping rate
  • No nonce checks implemented
  • Medium severity vulnerability in history
Vulnerabilities
1 published

Text Hover Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2022-0737medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Text Hover <= 4.1 - Admin+ Stored Cross-Site Scripting

Apr 9, 2022 Patched in 4.2 (654d)
Version History

Text Hover Release Timeline

v4.2Current
v4.11 CVE
v4.01 CVE
v3.9.11 CVE
v3.91 CVE
v3.81 CVE
v3.7.11 CVE
v3.61 CVE
v3.5.11 CVE
v3.51 CVE
v3.2.21 CVE
v3.2.11 CVE
v3.21 CVE
v3.1.11 CVE
v3.11 CVE
v3.0.31 CVE
v3.0.21 CVE
v3.0.11 CVE
v3.01 CVE
v2.21 CVE
Code Analysis
Analyzed Mar 16, 2026

Text Hover Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
22
14 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$plugins = unserialize( $r['body']['plugins'] );c2c-plugin.php:298

Output Escaping

39% escaped36 total outputs
Attack Surface

Text Hover Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actioninitc2c-plugin.php:122
actionadmin_initc2c-plugin.php:125
actionadmin_headc2c-plugin.php:126
filterplugin_row_metac2c-plugin.php:189
filterhttp_request_argsc2c-plugin.php:192
actionadmin_menuc2c-plugin.php:196
filtercontextual_helpc2c-plugin.php:199
actionadmin_enqueue_scriptsc2c-plugin.php:201
actionwp_enqueue_scriptstext-hover.php:288
actionadmin_print_scriptstext-hover.php:289
filterget_comment_texttext-hover.php:291
filterget_comment_excerpttext-hover.php:292
actionplugins_loadedtext-hover.php:671
Maintenance & Trust

Text Hover Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 23, 2022
PHP min version
Downloads63K

Community Trust

Rating90/100
Number of ratings17
Active installs2K
Developer Profile

Text Hover Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Text Hover

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/text-hover/css/text-hover.css/wp-content/plugins/text-hover/js/text-hover.js
Script Paths
/wp-content/plugins/text-hover/js/text-hover.js
Version Parameters
text-hover/css/text-hover.css?ver=text-hover/js/text-hover.js?ver=

HTML / DOM Fingerprints

CSS Classes
c2c_text_hover_tooltip
Data Attributes
data-c2c-text-hover
FAQ

Frequently Asked Questions about Text Hover