Buddypress and qTranslate Security & Risk Analysis

wordpress.org/plugins/buddypress-qtranslate

Plugin for optimize qTranslate for Buddypress and support of BP Admin bar

10 active installs v1.2 PHP + WP + Updated Aug 9, 2010
admin-barbuddypressmenuqtranslate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Buddypress and qTranslate Safe to Use in 2026?

Generally Safe

Score 85/100

Buddypress and qTranslate has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the buddypress-qtranslate plugin version 1.2 presents a mixed security posture. On the positive side, there are no identified dangerous functions, SQL queries are 100% using prepared statements, and there are no recorded CVEs or external HTTP requests. The absence of a large attack surface (no AJAX handlers, REST API routes, shortcodes, or cron events) is also a strong indicator of good security design in terms of entry points. However, a significant concern is the complete lack of output escaping across all identified outputs. This means that any dynamic data rendered by the plugin is potentially vulnerable to cross-site scripting (XSS) attacks, which can lead to unauthorized actions, data theft, or website defacement. The lack of nonce checks and capability checks on entry points (even though the attack surface is zero) suggests a potential for future vulnerabilities if entry points were to be added without proper security measures.

While the plugin has no historical vulnerabilities and no critical or high severity taint flows were detected, the lack of output escaping is a pervasive issue that could be exploited. The absence of any taint analysis results suggests that either the analysis tool couldn't find any flows, or the plugin's code was too limited for a thorough taint analysis. The conclusion is that the plugin is currently free from common, severe vulnerabilities like SQL injection or known CVEs, and its attack surface is minimal. However, the critical weakness in output escaping poses a significant XSS risk that must be addressed. The absence of security checks on non-existent entry points is a neutral factor for now, but it highlights a potential gap if the plugin were to evolve.

Key Concerns

  • Output escaping is not implemented
Vulnerabilities
None known

Buddypress and qTranslate Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Buddypress and qTranslate Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Buddypress and qTranslate Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionbp_adminbar_menusbp-qt.php:74
actionbp_adminbar_menusbp-qt.php:83
actionwp_footerbp-qt.php:86
Maintenance & Trust

Buddypress and qTranslate Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.0
Last updatedAug 9, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Buddypress and qTranslate Developer Profile

bengo-matus

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Buddypress and qTranslate

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
qtrans_language_chooser
Data Attributes
id="langli"
Shortcode Output
<li class="align-right" id="bp-adminbar-dashboard"><a href="/wp-admin/">__('Dashboard')</a></li>
FAQ

Frequently Asked Questions about Buddypress and qTranslate