Google Cloud Storage plugin Security & Risk Analysis

wordpress.org/plugins/gcs

A plugin for uploading media files to Google Cloud Storage.

300 active installs v0.1.6 PHP 5.5+ WP + Updated Sep 2, 2020
googlegoogle-cloud-storage
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google Cloud Storage plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Google Cloud Storage plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin 'gcs' v0.1.6 exhibits a generally good security posture with no known vulnerabilities and a limited attack surface. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, coupled with zero taint flows and no dangerous function usage, are significant strengths. The plugin also demonstrates good practices by using prepared statements for all SQL queries and performing at least one capability check.

However, there are areas for improvement. The output escaping is only 43% properly done, indicating a potential risk for cross-site scripting (XSS) vulnerabilities if user-supplied data is not adequately sanitized before being displayed. The presence of file operations and the inclusion of a bundled library (Guzzle), especially without information on its version or patching status, could represent latent risks. The lack of nonces on any potential entry points (though there are none listed) is a theoretical concern, but with zero entry points, this is not a current exploit vector.

In conclusion, 'gcs' v0.1.6 appears to be a secure plugin due to its minimal attack surface and the absence of critical code signals. The primary concern lies in the unescaped output, which warrants attention to prevent potential XSS. The vulnerability history being clean is a very positive sign. The strengths heavily outweigh the weaknesses, but addressing the output escaping is crucial for maintaining this secure standing.

Key Concerns

  • Output escaping is not fully implemented (43%)
  • Bundled library detected (Guzzle)
  • File operations present
Vulnerabilities
None known

Google Cloud Storage plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Google Cloud Storage plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
3 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

43% escaped7 total outputs
Attack Surface

Google Cloud Storage plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterplugin_action_linksgcs.php:152
actionadmin_menugcs.php:153
actionadmin_initgcs.php:154
filterupload_dirUploads\Uploads.php:45
filterwp_delete_fileUploads\Uploads.php:46
actiongcs_register_settingsUploads\Uploads.php:102
Maintenance & Trust

Google Cloud Storage plugin Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedSep 2, 2020
PHP min version5.5
Downloads73K

Community Trust

Rating54/100
Number of ratings7
Active installs300
Developer Profile

Google Cloud Storage plugin Developer Profile

Google

3 plugins · 5.1M total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
522 days
View full developer profile
Detection Fingerprints

How We Detect Google Cloud Storage plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Google Cloud Storage plugin