Add to Circle Widget Security & Risk Analysis

wordpress.org/plugins/add-to-circle-widget

This plugin generates a widget to add Google+ badge on your blog with 'Add to Circles' button.

10 active installs v1.0 PHP + WP 2.9+ Updated Unknown
add-to-circlegooglegoogle-badgeplus-one-badge
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Add to Circle Widget Safe to Use in 2026?

Generally Safe

Score 100/100

Add to Circle Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'add-to-circle-widget' v1.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no file operations, no external HTTP requests, and all SQL queries utilize prepared statements. Furthermore, there is a complete absence of known vulnerabilities (CVEs) and a history of no recorded issues, which suggests a generally well-maintained codebase.

However, significant concerns arise from the lack of any output escaping. With 18 total outputs, none are properly escaped, presenting a high risk of Cross-Site Scripting (XSS) vulnerabilities. This deficiency, coupled with the absence of nonces and capability checks, leaves the plugin vulnerable to injection attacks that could be leveraged to execute arbitrary JavaScript in the context of a logged-in user's session, even if no direct entry points like AJAX or REST API endpoints are exposed without authentication. The zero count for taint analysis flows is likely a result of limited analysis or the absence of exploitable flows, but it does not mitigate the risk posed by unescaped output.

In conclusion, while the plugin's foundation appears solid with secure database interactions and a clean vulnerability history, the critical oversight in output sanitization renders it highly susceptible to XSS attacks. This weakness overshadows the strengths and requires immediate attention to prevent potential security breaches.

Key Concerns

  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Add to Circle Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Add to Circle Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped18 total outputs
Attack Surface

Add to Circle Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initadd-to-circle-widget.php:15
actionwp_headadd-to-circle-widget.php:162
Maintenance & Trust

Add to Circle Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Add to Circle Widget Developer Profile

Tesur Rajan

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Add to Circle Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://apis.google.com/js/plusone.js

HTML / DOM Fingerprints

CSS Classes
Add_to_Circle_Widget
Data Attributes
data-gapiscan
Shortcode Output
<g:plus href=size=theme=
FAQ

Frequently Asked Questions about Add to Circle Widget