Custom GlotPress Source Security & Risk Analysis

wordpress.org/plugins/custom-glotpress-source

Allows to manage translations from a custom GlotPress install.

10 active installs v1.5.3 PHP 7.4+ WP 5.3+ Updated Unknown
glotpressinternationalizationlocalisationpremiumtranslation
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom GlotPress Source Safe to Use in 2026?

Generally Safe

Score 100/100

Custom GlotPress Source has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "custom-glotpress-source" plugin version 1.5.3 presents a generally positive security posture, with no recorded vulnerabilities or high-severity code signals. The absence of known CVEs and the use of prepared statements for all SQL queries are strong indicators of good security development practices. The plugin also demonstrates awareness of security by implementing nonce checks and file operations, and it doesn't appear to bundle outdated libraries.

However, there are notable concerns that temper this positive outlook. The most significant finding is that 100% of the eight identified output operations are not properly escaped. This creates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the plugin's output, potentially affecting users. Additionally, the plugin makes two external HTTP requests, and while the static analysis doesn't indicate unsanitized inputs leading to these requests, it's a potential vector for man-in-the-middle attacks or other vulnerabilities if not handled securely.

While the plugin has a clean vulnerability history, this doesn't negate the risks identified in the static analysis. The lack of properly escaped output is a critical flaw that requires immediate attention. The plugin's strength lies in its minimal attack surface and adherence to SQL prepared statements, but the unescaped output represents a substantial weakness that could be exploited by attackers. It's crucial to address the output escaping issue to improve the overall security of the plugin.

Key Concerns

  • All output operations lack proper escaping
  • External HTTP requests are present
Vulnerabilities
None known

Custom GlotPress Source Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom GlotPress Source Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
2
Capability Checks
0
File Operations
1
External Requests
2
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

Custom GlotPress Source Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitcustom-glotpress-source.php:14
actionadmin_initcustom-glotpress-source.php:38
actionadmin_post_updatecustom-glotpress-source.php:39
actioncore_upgrade_preamblecustom-glotpress-source.php:40
actionupdate-core-custom_do-custom-translation-upgradecustom-glotpress-source.php:41
actionadmin_enqueue_scriptscustom-glotpress-source.php:42
Maintenance & Trust

Custom GlotPress Source Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Custom GlotPress Source Developer Profile

Bastien Ho

12 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
15 days
View full developer profile
Detection Fingerprints

How We Detect Custom GlotPress Source

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-glotpress-source/js/script.js
Script Paths
/wp-content/plugins/custom-glotpress-source/js/script.js
Version Parameters
custom-glotpress-source/js/script.js?ver=

HTML / DOM Fingerprints

JS Globals
Custom_GlotPress_Source
FAQ

Frequently Asked Questions about Custom GlotPress Source