External Gallery2 Image Block Plugin Security & Risk Analysis

wordpress.org/plugins/gallery2-image-block-widget

Widget to display a Gallery 2 (not WPG2!) Image Block in Wordpress sidebar

10 active installs v0.1.5 PHP + WP + Updated Aug 14, 2009
gallery2image-blockwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is External Gallery2 Image Block Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

External Gallery2 Image Block Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The plugin "gallery2-image-block-widget" v0.1.5 exhibits a strong security posture concerning its attack surface and vulnerability history. The static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points for attackers to exploit through these common vectors. Furthermore, the plugin has no recorded vulnerabilities (CVEs) and uses prepared statements for all SQL queries, indicating good database security practices. The absence of taint analysis findings also suggests that internal data handling is likely secure.

However, the code analysis does raise concerns about output escaping. With 7 total outputs and 0% properly escaped, this presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed by the plugin without proper sanitization or escaping could be leveraged by an attacker to inject malicious scripts into the user's browser. While the plugin has no known CVEs, this unescaped output is a critical weakness that needs immediate attention. The single external HTTP request also warrants further investigation to ensure it does not introduce supply chain risks or information leakage.

In conclusion, the plugin's lack of known vulnerabilities and minimal attack surface are positive signs. However, the complete lack of output escaping is a major flaw that overshadows these strengths. This weakness makes the plugin highly susceptible to XSS attacks, and despite its clean history, it represents a critical security gap. Prioritizing the implementation of robust output escaping mechanisms is essential to mitigate this risk.

Key Concerns

  • All outputs are unescaped
  • External HTTP request without security context
Vulnerabilities
None known

External Gallery2 Image Block Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

External Gallery2 Image Block Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

External Gallery2 Image Block Plugin Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

External Gallery2 Image Block Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested2.8.4
Last updatedAug 14, 2009
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

External Gallery2 Image Block Plugin Developer Profile

Lentil

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect External Gallery2 Image Block Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- G2 ImageBlock --><!-- /G2 ImageBlock -->
Data Attributes
id="G2_ImageBlock-title"name="G2_ImageBlock-title"id="G2_ImageBlock-gallery-url"name="G2_ImageBlock-gallery-url"id="G2_ImageBlock-g2_blocks"name="G2_ImageBlock-g2_blocks"+12 more
FAQ

Frequently Asked Questions about External Gallery2 Image Block Plugin