AMS Google Webmaster Tools Security & Risk Analysis

wordpress.org/plugins/ams-google-webmaster-tools

Adds Google Webmaster Tools verification meta-tag.

400 active installs v1.3 PHP + WP 3.1+ Updated Jan 23, 2022
analyticscodegooglegoogle-analyticsgoogle-webmaster
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AMS Google Webmaster Tools Safe to Use in 2026?

Generally Safe

Score 85/100

AMS Google Webmaster Tools has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The ams-google-webmaster-tools plugin v1.3 exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points (AJAX handlers, REST API routes, shortcodes, cron events) significantly reduces the potential for external exploitation. Furthermore, the code signals indicate responsible development practices, with no dangerous functions, SQL queries utilizing prepared statements, and no file operations or external HTTP requests that could be exploited. The presence of a capability check, though only one, is a positive sign.

However, there are minor areas for improvement. The output escaping is only 33% properly implemented, meaning some data outputted by the plugin might not be adequately sanitized, potentially leading to cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in these unescaped outputs. While the taint analysis shows no issues, this is likely due to the limited attack surface, and the unescaped output remains a potential concern.

The plugin's vulnerability history is remarkably clean, with no known CVEs. This suggests a consistent history of secure development or a lack of past security incidents. In conclusion, ams-google-webmaster-tools v1.3 appears to be a secure plugin with a minimal attack surface and a positive track record. The primary area of concern is the partial output escaping, which, while not explicitly demonstrated as a vulnerability here, warrants attention to ensure complete sanitization of all outputs.

Key Concerns

  • Output escaping not fully implemented
Vulnerabilities
None known

AMS Google Webmaster Tools Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AMS Google Webmaster Tools Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

AMS Google Webmaster Tools Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initams-google-webmaster-tools.php:73
actionadmin_menuams-google-webmaster-tools.php:74
actionwp_headams-google-webmaster-tools.php:79
Maintenance & Trust

AMS Google Webmaster Tools Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedJan 23, 2022
PHP min version
Downloads13K

Community Trust

Rating0/100
Number of ratings0
Active installs400
Developer Profile

AMS Google Webmaster Tools Developer Profile

Manoj

6 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AMS Google Webmaster Tools

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- AMS Google Webmaster Tools plugin for WordPress -->
FAQ

Frequently Asked Questions about AMS Google Webmaster Tools