Gecka BgStretcher Security & Risk Analysis

wordpress.org/plugins/gecka-bgstretcher

The plugin allows you to add a large image (or a set of images) to the background of your web page and will proportionally resize the image(s) to fill …

10 active installs v0.2 PHP + WP 3.0+ Updated Jan 21, 2011
backgroundbackground-stretchbgstretcherimagejquery
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gecka BgStretcher Safe to Use in 2026?

Generally Safe

Score 85/100

Gecka BgStretcher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The gecka-bgstretcher plugin v0.2 exhibits a strong adherence to secure coding practices in several key areas, which is a positive indicator. The absence of any known vulnerabilities in its history, including critical or high severity ones, suggests a mature and stable development process. Furthermore, the plugin does not perform file operations, external HTTP requests, or use bundled libraries, thereby reducing potential attack vectors and dependency-related risks. The static analysis also shows zero identified dangerous functions, zero taint flows, and SQL queries that are all prepared statements, further bolstering its security profile.

However, the analysis does reveal a significant concern regarding output escaping. With 10 total outputs and 0% properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the plugin without proper sanitization or escaping could be exploited by attackers to inject malicious scripts into the user's browser. While there are no apparent AJAX handlers, REST API routes, shortcodes, or cron events, and thus no immediate unprotected entry points or direct capability checks indicated, the lack of output escaping is a critical oversight that overshadows these positive findings. A more thorough review of the plugin's functionality is recommended to ensure all dynamic content is securely handled.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

Gecka BgStretcher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Gecka BgStretcher Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Gecka BgStretcher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Attack Surface

Gecka BgStretcher Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedbgstretcher.php:41
actionwp_headbgstretcher.php:79
Maintenance & Trust

Gecka BgStretcher Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJan 21, 2011
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Gecka BgStretcher Developer Profile

Gecka

4 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gecka BgStretcher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gecka-bgstretcher/bgstretcher.js/wp-content/plugins/gecka-bgstretcher/bgstretcher.css
Script Paths
/wp-content/plugins/gecka-bgstretcher/bgstretcher.js
Version Parameters
gecka-bgstretcher/bgstretcher.js?ver=gecka-bgstretcher/bgstretcher.css?ver=

HTML / DOM Fingerprints

CSS Classes
bgstretcher
FAQ

Frequently Asked Questions about Gecka BgStretcher