Vote It! Security & Risk Analysis

wordpress.org/plugins/vote-it

Vote It! Buttons for Blogpostings. Set very simple a digg, sphinn or another social-news-button in your blogpost.

10 active installs v0.3.2 PHP + WP 2.5.3+ Updated Dec 26, 2008
diggpostsocial-mediavotevoting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Vote It! Safe to Use in 2026?

Generally Safe

Score 85/100

Vote It! has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The 'vote-it' plugin v0.3.2 exhibits a mixed security posture. While it boasts a seemingly small attack surface with no reported CVEs and no apparent bundled libraries, the static analysis reveals significant underlying concerns. The plugin's handling of SQL queries is particularly alarming, with all 36 queries being unescaped, and a concerning taint analysis showing one flow with unsanitized paths classified as high severity.

These code-level issues, despite the absence of historical vulnerabilities, suggest a high potential for exploitation. The lack of proper output escaping and the presence of raw SQL without prepared statements are classic indicators of SQL injection vulnerabilities. The high severity taint flow further corroborates the risk of sensitive data exposure or manipulation. While the plugin has no known public vulnerabilities, this could be due to its limited usage or lack of thorough auditing, rather than inherent security.

In conclusion, the 'vote-it' plugin v0.3.2, despite its clean vulnerability history, presents a considerable risk due to critical insecure coding practices. The extensive use of raw SQL without prepared statements and the identified high-severity unsanitized taint flow are significant red flags that necessitate immediate attention and remediation.

Key Concerns

  • High severity unsanitized taint flow
  • Raw SQL queries without prepared statements
  • Unescaped output
  • No capability checks on identified flows
Vulnerabilities
None known

Vote It! Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Vote It! Release Timeline

v0.3.2Current
v0.3.1
v0.3
Code Analysis
Analyzed Mar 16, 2026

Vote It! Code Analysis

Dangerous Functions
0
Raw SQL Queries
36
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared36 total queries

Output Escaping

0% escaped3 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<vote-it> (vote-it.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Vote It! Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedvote-it.php:11
actionadmin_menuvote-it.php:12
filterthe_contentvote-it.php:13
actionadmin_headvote-it.php:60
actionedit_form_advancedvote-it.php:62
actionsave_postvote-it.php:63
Maintenance & Trust

Vote It! Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedDec 26, 2008
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Vote It! Developer Profile

DZVO

3 plugins · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Vote It!

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vote-it/js.js
Script Paths
http://digg.com/tools/diggthis.js

HTML / DOM Fingerprints

CSS Classes
voteIt-services
Data Attributes
data-voteit-namedata-voteit-code
JS Globals
msVoteIt
FAQ

Frequently Asked Questions about Vote It!