gaplugin-darkmode Security & Risk Analysis

wordpress.org/plugins/darkmode-ga

Use a shortcode to create a light/dark mode.

0 active installs v0.01.00.00 PHP 7.2+ WP 5.2+ Updated Unknown
colorsdarkdarkmodelightnavigation
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is gaplugin-darkmode Safe to Use in 2026?

Generally Safe

Score 100/100

gaplugin-darkmode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "darkmode-ga" plugin, at version 0.01.00.00, exhibits a generally good security posture based on the static analysis provided. The absence of known vulnerabilities in its history and the lack of any critical or high-severity taint flows are positive indicators. Furthermore, the plugin demonstrates proper handling of SQL queries by exclusively using prepared statements, which mitigates common SQL injection risks.

However, a significant concern arises from the complete lack of output escaping across all identified output points. This absence creates a substantial risk for Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or data generated by the plugin could be injected into the page without proper sanitization, leading to malicious code execution in the user's browser. Additionally, the lack of any observed capability checks or nonce checks on potential entry points, while currently not directly exploitable due to the limited attack surface, leaves the plugin susceptible to privilege escalation or unauthorized actions if its entry points expand in future versions without proper authorization mechanisms.

In conclusion, while the plugin scores well on preventing common vulnerabilities like SQL injection and has no known historical issues, the critical flaw of universally unescaped output presents a serious security risk. The lack of robust authorization checks on its (currently minimal) entry points is another area for improvement. Addressing the output escaping issue should be the highest priority.

Key Concerns

  • All outputs are unescaped
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

gaplugin-darkmode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

gaplugin-darkmode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

gaplugin-darkmode Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterrest_authentication_errorsgaplugin-darkmode-plugin.php:31
actioninitgaplugin-darkmode-plugin.php:59
actionwp_enqueue_scriptsincludes\AdminPage.php:81
actionadmin_enqueue_scriptsincludes\AdminPage.php:82
actionadmin_initincludes\AdminPage.php:83
actionadmin_menuincludes\AdminPage.php:84
Maintenance & Trust

gaplugin-darkmode Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedUnknown
PHP min version7.2
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

gaplugin-darkmode Developer Profile

GAUTIER Antoine

4 plugins · 0 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect gaplugin-darkmode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/darkmode-ga/includes/DarkMode.css/wp-content/plugins/darkmode-ga/includes/DarkMode-admin.css

HTML / DOM Fingerprints

CSS Classes
darkmode-switch
FAQ

Frequently Asked Questions about gaplugin-darkmode