Zool Viral Ads Security & Risk Analysis

wordpress.org/plugins/zool-viral-ads

Display popular content to your users from your own site and/or from our sponsored partners, increasing visitor engagement and revenue.

10 active installs v1.1.1.13 PHP + WP 3.0.6+ Updated Mar 19, 2017
adsadvertisingengagementrelated-contentrevenue
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Zool Viral Ads Safe to Use in 2026?

Generally Safe

Score 85/100

Zool Viral Ads has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The zool-viral-ads plugin version 1.1.1.13 exhibits a mixed security posture. While it demonstrates excellent practices in areas like SQL query sanitization (100% prepared statements) and a lack of known CVEs, significant concerns arise from its static analysis. The absence of any capability checks or nonce checks, coupled with the presence of a dangerous function like 'unserialize' and a concerning 0% output escaping rate, creates potential pathways for vulnerabilities if any entry points were to be discovered or exploited.

The current static analysis shows zero attack surface points and zero taint flows, which is positive. However, this could be a result of the plugin having a very limited or static function, or it could indicate that the analysis tools might not be identifying all potential vulnerabilities. The 'unserialize' function, in particular, is a known source of Remote Code Execution (RCE) vulnerabilities when processing untrusted input. The complete lack of output escaping is also a serious red flag, opening the door to Cross-Site Scripting (XSS) vulnerabilities if any user-controllable data is displayed without proper sanitization.

Given the complete absence of past vulnerabilities, it's difficult to draw definitive conclusions about its long-term security track record. However, the current code analysis reveals critical weaknesses that, if combined with any form of exploitable input, could lead to severe security incidents. The plugin's strengths lie in its SQL handling and lack of known exploits, but its weaknesses in input sanitization and authentication checks are substantial and warrant immediate attention.

Key Concerns

  • Dangerous function detected (unserialize)
  • 0% output escaping detected
  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Zool Viral Ads Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Zool Viral Ads Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$geo = unserialize(file_get_contents("http://www.geoplugin.net/php.gp?ip=$user_ip"));zoolviralads.php:177

Output Escaping

0% escaped6 total outputs
Attack Surface

Zool Viral Ads Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_enqueue_scriptszoolviralads.php:103
filterthe_contentzoolviralads.php:104
actionadmin_menuzoolviralads.php:165
actionadmin_initzoolviralads.php:171
actionwidgets_initzoolviralads.php:188
Maintenance & Trust

Zool Viral Ads Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedMar 19, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Zool Viral Ads Developer Profile

zoolley

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Zool Viral Ads

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zool-viral-ads/css/zoolplugin.css
Version Parameters
zool-viral-ads/css/zoolplugin.css?ver=

HTML / DOM Fingerprints

CSS Classes
container-fluidzool_widget_classmain
Data Attributes
id="zolley_ad_content"
REST Endpoints
/native/api/get_ad_contents/
Shortcode Output
<p style="font-family: helvetica; font-size: 14px">You May Also Like</p> <p style="text-align:right;font-size:11px;"><a href="http://zoolley.com/native/" target="_blank">Ads by Zoolley</a></p><div style="clear:both;"></div> <div id="zolley_ad_content"><center>Please set a valid Widget ID to activate ads.</center><a href="http://zoolley.com/native/" target="_blank">Ads by Zoolley</a>
FAQ

Frequently Asked Questions about Zool Viral Ads