Upvotr Security & Risk Analysis

wordpress.org/plugins/upvotr

A WordPress plugin to allow simple upvoting of post objects by a user.

10 active installs v1.0 PHP + WP 4.0+ Updated Feb 29, 2016
downvotelikesupvotevoting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Upvotr Safe to Use in 2026?

Generally Safe

Score 85/100

Upvotr has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "upvotr" v1.0 plugin exhibits a strong initial security posture based on the provided static analysis. The absence of any identified attack surface entry points (AJAX, REST API, shortcodes, cron events) is a significant positive, as it severely limits potential avenues for exploitation. Furthermore, the code demonstrates good practices by using prepared statements for all SQL queries and not performing file operations or external HTTP requests. The taint analysis, while showing two flows with unsanitized paths, did not identify any critical or high severity issues, suggesting these paths might not lead to exploitable vulnerabilities or are contained within the plugin's logic without external interaction.

However, there are notable areas of concern. The complete lack of nonce checks and capability checks across all entry points (even if none were found) is a significant weakness. If any new entry points were inadvertently introduced or if certain internal functions are called directly without proper authorization, these would be prime targets for exploitation. The 80% output escaping rate, while relatively good, still leaves 20% of outputs potentially unescaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is involved in those specific outputs.

The plugin's vulnerability history is completely clean, with no recorded CVEs. This is a positive indicator, but it's important to remember that a lack of past vulnerabilities does not guarantee future security, especially given the identified weaknesses in nonce and capability checks. Overall, "upvotr" v1.0 has a strong foundation in terms of minimizing its attack surface and secure data handling for SQL, but the lack of robust authorization and validation mechanisms leaves it susceptible to potential vulnerabilities if new entry points arise or if the existing unsanitized taint flows are exploitable in a broader context.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • 20% of outputs not properly escaped
  • Taint flows with unsanitized paths (2)
Vulnerabilities
None known

Upvotr Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Upvotr Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped10 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
action_check (upvotr\upvotr.class.php:35)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Upvotr Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionparse_requestupvotr\upvotr.class.php:8
Maintenance & Trust

Upvotr Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 29, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Upvotr Developer Profile

Liam Gladdy

3 plugins · 330 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Upvotr

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Upvotr