
Text Hover Security & Risk Analysis
wordpress.org/plugins/text-hoverAdd hover text (aka tooltips) to content in posts. Handy for providing explanations of names, terms, phrases, abbreviations, and acronyms.
Is Text Hover Safe to Use in 2026?
Generally Safe
Score 85/100Text Hover has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "text-hover" plugin v4.2 exhibits a mixed security posture. On the positive side, the plugin has a minimal attack surface with no discoverable AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are good security practices. However, several concerns emerge from the static analysis. The presence of the `unserialize` function is a significant red flag, as it can be a vector for object injection vulnerabilities if the serialized data is not strictly controlled. The output escaping rate is also a concern, with 61% of outputs not properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks, despite the presence of a capability check, suggests potential for CSRF or unauthorized actions if an entry point were to be discovered.
The vulnerability history indicates a past medium-severity XSS vulnerability, which aligns with the output escaping issues found in the current analysis. The fact that this vulnerability is no longer unpatched is positive, but it highlights a recurring theme of input sanitization and output escaping weaknesses. The overall conclusion is that while the plugin has a small attack surface and uses secure practices for database interactions, the presence of `unserialize` and poor output escaping, coupled with a history of XSS, warrants careful consideration. The plugin is not inherently insecure due to its limited entry points, but the identified code signals and past vulnerabilities suggest a need for more robust input validation and output encoding.
Key Concerns
- Dangerous function unserialize found
- Low output escaping rate
- No nonce checks implemented
- Medium severity vulnerability in history
Text Hover Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Text Hover <= 4.1 - Admin+ Stored Cross-Site Scripting
Text Hover Release Timeline
Text Hover Code Analysis
Dangerous Functions Found
Output Escaping
Text Hover Attack Surface
WordPress Hooks 13
Maintenance & Trust
Text Hover Maintenance & Trust
Maintenance Signals
Community Trust
Text Hover Alternatives
Easy Glossary
easy-glossary
A lightweight, flexible glossary plugin that auto-links terms, shows tooltips, and provides an index shortcode.
Category Order and Taxonomy Terms Order
taxonomy-terms-order
Drag-and-drop ordering for Categories & any taxonomy (hierarchically) using a Drag and Drop Sortable JavaScript capability.
Complianz – Terms and Conditions
complianz-terms-conditions
Configure your own Terms and Conditions specific to your service or webshop.
iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more
iubenda-cookie-law-solution
The solution for GDPR compliance + more. Get your cookie banner, privacy policy, terms and conditions and handle cookie consent in just one plugin.
3CX Free Live Chat, Calls & Messaging
wp-live-chat-support
Chat with your website visitors in real-time for free! Engage with your customers and increase sales.
Text Hover Developer Profile
63 plugins · 92K total installs
How We Detect Text Hover
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/text-hover/css/text-hover.css/wp-content/plugins/text-hover/js/text-hover.js/wp-content/plugins/text-hover/js/text-hover.jstext-hover/css/text-hover.css?ver=text-hover/js/text-hover.js?ver=HTML / DOM Fingerprints
c2c_text_hover_tooltipdata-c2c-text-hover