Extended Gravatar Security & Risk Analysis

wordpress.org/plugins/extended-gravatar

This plugin brings Hovercard popups for your commenters via Gravatar

10 active installs v0.6 PHP + WP 3.1+ Updated Unknown
avatargravatarhovercardsmoallemi%da%a9%d8%a7%d9%88%d8%b4%da%af%d8%b1
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Extended Gravatar Safe to Use in 2026?

Generally Safe

Score 100/100

Extended Gravatar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The extended-gravatar plugin version 0.6 exhibits a mixed security posture. On the positive side, it demonstrates excellent practices regarding SQL queries by exclusively using prepared statements and has no recorded vulnerabilities, including CVEs. The lack of external HTTP requests and bundled libraries is also a good sign. However, the analysis reveals significant concerns in other areas. Notably, the plugin has a low percentage of properly escaped output, indicating a potential for cross-site scripting (XSS) vulnerabilities where user-supplied data might be rendered directly in the browser without proper sanitization. Furthermore, the taint analysis shows that all analyzed flows have unsanitized paths, though thankfully, these did not escalate to critical or high severity issues in this specific scan. The absence of nonce checks and capability checks across its entry points (though currently zero) points to a lack of built-in security mechanisms that could be exploited if new entry points are introduced or if existing ones are misconfigured. While the current attack surface is reported as zero, this plugin's architecture seems to lack robust security fundamentals.

Key Concerns

  • Low percentage of properly escaped output
  • All analyzed taint flows have unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Extended Gravatar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Extended Gravatar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

29% escaped7 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
extended_gravatar_options (extended-gravatar.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Extended Gravatar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_headextended-gravatar.php:53
actionwp_enqueue_scriptsextended-gravatar.php:54
actionadmin_menuextended-gravatar.php:155
actionwp_insert_commentextended-gravatar.php:176
actiontransition_comment_statusextended-gravatar.php:202
Maintenance & Trust

Extended Gravatar Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Extended Gravatar Developer Profile

moallemi

6 plugins · 90 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extended Gravatar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/extended-gravatar/css/hovercard.css/wp-content/plugins/extended-gravatar/css/services.css
Script Paths
/wp-content/plugins/extended-gravatar/js/gprofiles.js
Version Parameters
extended-gravatar/css/hovercard.css?ver=extended-gravatar/css/services.css?ver=extended-gravatar/js/gprofiles.js?ver=

HTML / DOM Fingerprints

Data Attributes
id="gravatar-card-css"id="gravatar-card-services-css"name="extended_gravatar_url"
JS Globals
var extended_gravatar_url =
FAQ

Frequently Asked Questions about Extended Gravatar