Share to Parler Security & Risk Analysis

wordpress.org/plugins/widget-for-parler

Creates a widget for a Follow me on Parler and Share on Parler Buttons

10 active installs v0.5 PHP 5.4+ WP 4.0+ Updated Jul 15, 2020
buttonfollowsharesocial-media
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Share to Parler Safe to Use in 2026?

Generally Safe

Score 85/100

Share to Parler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "widget-for-parler" plugin version 0.5 exhibits a generally strong security posture based on the provided static analysis. The plugin has no recorded vulnerabilities, indicating a history of secure development or successful patching of any past issues. The static analysis reveals a remarkably small attack surface with zero entry points, and crucially, zero unprotected ones. Furthermore, the code does not utilize dangerous functions, performs SQL queries exclusively through prepared statements, and demonstrates a high percentage of properly escaped output. File operations and external HTTP requests are absent, further minimizing potential risks.

While the lack of nonces and capability checks on the identified entry points is a point of concern, the absence of any actual entry points makes this less of an immediate threat. The taint analysis also reports no identified flows, suggesting that user-supplied data is not being mishandled within the scope of the analysis. The plugin's strengths lie in its minimal attack surface and its adherence to secure coding practices for its core operations, such as SQL queries and output escaping. The primary area for potential improvement would be the implementation of robust authentication and authorization mechanisms if any entry points were to be introduced in future versions.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Share to Parler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Share to Parler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
22 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

85% escaped26 total outputs
Attack Surface

Share to Parler Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwidgets_initshare-to-parler.php:120
actionadmin_menushare-to-parler.php:131
actionadmin_initshare-to-parler.php:132
actionwp_enqueue_scriptsshare-to-parler.php:224
Maintenance & Trust

Share to Parler Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 15, 2020
PHP min version5.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Share to Parler Developer Profile

radianceLux

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Share to Parler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/widget-for-parler/css/style1.css

HTML / DOM Fingerprints

CSS Classes
parlerfollowparlershare
Data Attributes
for="parler_username_0"
JS Globals
window.parlerFOLLOWwindow.parlerSHARE
FAQ

Frequently Asked Questions about Share to Parler