WP LikeJS Security & Risk Analysis

wordpress.org/plugins/wp-likejs

WP LikeJS includes an eyecatching Facebook Like Box on your website. You'll get more Fans with LikeJS than with an usual Like Button and it locks …

20 active installs v1.0.1 PHP + WP 3.0.2.+ Updated Unknown
facebooklikelike-boxsocial-iconssocial-media
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP LikeJS Safe to Use in 2026?

Generally Safe

Score 100/100

WP LikeJS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The wp-likejs plugin, version 1.0.1, presents a mixed security picture. On the positive side, it demonstrates adherence to secure coding practices by completely avoiding SQL injection vulnerabilities through the exclusive use of prepared statements. Furthermore, its attack surface appears to be minimal, with no registered AJAX handlers, REST API routes, shortcodes, or cron events, indicating a limited number of potential entry points for attackers. The absence of known CVEs and historical vulnerabilities is also a strong indicator of a stable and well-maintained codebase. However, a significant concern is the complete lack of output escaping. With 100% of outputs unescaped, the plugin is highly susceptible to Cross-Site Scripting (XSS) attacks, which could lead to unauthorized actions, session hijacking, or data theft. Additionally, the absence of nonce checks and capability checks, even with a seemingly small attack surface, leaves the door open for potential unauthorized operations if any entry points were to be discovered or introduced in future versions. The taint analysis also flagged flows with unsanitized paths, which, while not resulting in critical or high severity, warrants attention as it indicates potential for path traversal or other file-related vulnerabilities if not carefully managed.

Key Concerns

  • All outputs are unescaped
  • No nonce checks
  • No capability checks
  • Taint flows with unsanitized paths
Vulnerabilities
None known

WP LikeJS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP LikeJS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped16 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
likejs_options (wp-likejs.php:121)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP LikeJS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headwp-likejs.php:13
actionwp_footerwp-likejs.php:62
actionadmin_menuwp-likejs.php:259
Maintenance & Trust

WP LikeJS Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2.
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

WP LikeJS Developer Profile

3hmedia

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP LikeJS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-likejs/wp-likejs.css/wp-content/plugins/wp-likejs/img/close.png/wp-content/plugins/wp-likejs/img/relikejsbox.jpg

HTML / DOM Fingerprints

CSS Classes
fixed
HTML Comments
<!-- LIKEJS HTML -->
Data Attributes
id="likejsbox"id="relikejsbox"onClick="closeLikeJSBox()"onClick="reLikeJSBox()"
JS Globals
closeLikeJSBoxreLikeJSBoxsetCookiegetCookie
FAQ

Frequently Asked Questions about WP LikeJS