FilmGetter Security & Risk Analysis

wordpress.org/plugins/filmgetter

FilmGetter uses tags to show information like Poster, plot, rating, release date, TMDb and imdb urls.

10 active installs v0.1.4.1 PHP + WP 2.1+ Updated Sep 5, 2011
filmimdbmoviepostertmdb
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FilmGetter Safe to Use in 2026?

Generally Safe

Score 85/100

FilmGetter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin 'filmgetter' v0.1.4.1 presents a concerning security posture despite its minimal apparent attack surface. While the plugin boasts zero AJAX handlers, REST API routes, shortcodes, and cron events, this lack of entry points does not translate to overall safety. The static analysis reveals significant weaknesses, most notably that 0% of its 3 total outputs are properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, two taint flows were identified with unsanitized paths, rated as high severity, indicating potential for arbitrary file read or write operations, or other path traversal vulnerabilities. The complete absence of nonce and capability checks on any entry points (even though the static analysis reports 0 unprotected entry points, the lack of checks is a structural flaw if any were to be introduced) is a major red flag, as it allows any authenticated user to trigger plugin functionality, potentially leading to privilege escalation or unauthorized actions. The plugin's SQL usage is mixed, with 77% of queries using prepared statements, which is a positive sign, but the remaining 23% are not accounted for and could represent a risk if they are not properly sanitized. The absence of any known CVEs is a positive indicator, but given the identified code-level risks, this might be due to a lack of thorough auditing rather than inherent security. In conclusion, 'filmgetter' v0.1.4.1 exhibits critical weaknesses in output escaping and taint handling, coupled with a dangerous lack of security checks, making it a high-risk plugin despite its limited entry points.

Key Concerns

  • No output escaping
  • High severity unsanitized path taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

FilmGetter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

FilmGetter Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
10 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

77% prepared13 total queries

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
FilmGetter_menu (FilmGetter.php:370)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

FilmGetter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterthe_contentFilmGetter.php:266
filterthe_contentFilmGetter.php:267
filterthe_contentFilmGetter.php:268
filterthe_contentFilmGetter.php:269
filterwp_headFilmGetter.php:270
Maintenance & Trust

FilmGetter Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 5, 2011
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

FilmGetter Developer Profile

confact

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FilmGetter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/filmgetter/style.css
Version Parameters
filmgetter/style.css?ver=

HTML / DOM Fingerprints

Shortcode Output
[film][/film][imdb][/imdb]
FAQ

Frequently Asked Questions about FilmGetter