VC Extension Hover Image Security & Risk Analysis

wordpress.org/plugins/vc-extension-hover-image

VC Extension Hover Image is a plugin for WPBakery Page Builder to make a single image with hover

20 active installs v1.2.3 PHP 7.0+ WP 5.0+ Updated Aug 4, 2023
hover-imagevc-hover-imagewpbakery-hover-image
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is VC Extension Hover Image Safe to Use in 2026?

Generally Safe

Score 85/100

VC Extension Hover Image has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The plugin "vc-extension-hover-image" version 1.2.3 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, reliance on prepared statements for SQL queries, and 100% proper output escaping indicate good secure coding practices. The plugin also shows no history of known vulnerabilities, further reinforcing its current security standing. There are no identified taint flows or critical/high severity issues in the code analysis, suggesting a lack of exploitable weaknesses in these areas.

However, the analysis does highlight a potential area for concern: the lack of nonce and capability checks on its two entry points (shortcodes). While the attack surface is small and currently has no unprotected entry points, a lack of nonces on shortcodes means that if these shortcodes were to execute actions on the server side, they could be vulnerable to Cross-Site Request Forgery (CSRF) attacks if not properly secured by the theme or other plugins. This is a common oversight for plugins that rely solely on shortcode execution without explicit security measures for those specific actions.

In conclusion, the plugin is generally well-secured with robust handling of data and output. The primary weakness lies in the potential for CSRF if the shortcodes perform sensitive actions without explicit nonce protection. Given the absence of historical vulnerabilities and other code-level security issues, the overall risk is considered low, but this specific area warrants attention.

Key Concerns

  • Missing nonce checks on shortcodes
  • Missing capability checks on shortcodes
Vulnerabilities
None known

VC Extension Hover Image Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

VC Extension Hover Image Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

VC Extension Hover Image Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[vc_hover_image] index.php:25
[vc_hover_image] templates\vc_ext_hover_image.php:12
WordPress Hooks 2
actioninitindex.php:24
actioninittemplates\vc_ext_hover_image.php:11
Maintenance & Trust

VC Extension Hover Image Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 4, 2023
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

VC Extension Hover Image Developer Profile

Vincenzo

5 plugins · 2K total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VC Extension Hover Image

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
vc_align_leftvc_align_rightvc_align_center
Data Attributes
onMouseoveronMouseout
Shortcode Output
<div class="wpb_single_image wpb_content_element vc_align_<img src="" onMouseover="this.src=''" onMouseout="this.src='
FAQ

Frequently Asked Questions about VC Extension Hover Image