Gecko Google Calendar Security & Risk Analysis

wordpress.org/plugins/gecko-google-calendar

Gecko Google Calendar connects your site to Google Calendar and allows events to be displayed on pages using shortcodes.

10 active installs v1.6.7 PHP + WP 4.8+ Updated Aug 13, 2018
calendargoogle-calendarskeleton
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gecko Google Calendar Safe to Use in 2026?

Generally Safe

Score 85/100

Gecko Google Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The gecko-google-calendar plugin v1.6.7 presents a mixed security posture. On the positive side, it demonstrates good practices by not utilizing dangerous functions, executing all SQL queries using prepared statements, and having no recorded vulnerabilities. The absence of external HTTP requests and the use of a bundled library like Guzzle can also be seen as beneficial if managed correctly. However, significant concerns arise from the static analysis. A substantial portion of the attack surface, specifically two AJAX handlers, lacks authentication checks, making them vulnerable to unauthorized access. Furthermore, the output escaping is notably poor, with only 12% of outputs being properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities. While taint analysis found no critical or high-severity issues, the presence of unsanitized paths in all analyzed flows is a red flag that warrants further investigation.

Overall, the plugin's lack of known vulnerabilities and secure SQL handling are strengths. However, the unprotected AJAX endpoints and the widespread issue with output escaping create significant potential attack vectors. The taint analysis results, while not immediately critical, suggest potential for path manipulation if these flows are not properly sanitized elsewhere. The plugin's security is undermined by these identified code-level weaknesses, particularly the lack of authentication on AJAX handlers and poor output sanitization.

Key Concerns

  • Unprotected AJAX handlers
  • Poor output escaping
  • Unsanitized paths in taint flows
  • No nonce checks on AJAX
  • No capability checks
Vulnerabilities
None known

Gecko Google Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gecko Google Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
46
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

12% escaped52 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
__construct (admin\class-gecko-google-calendar-admin.php:32)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Gecko Google Calendar Attack Surface

Entry Points4
Unprotected2

AJAX Handlers 2

authwp_ajax_gecko_google_calendar_query_eventspublic\class-gecko-google-calendar-public.php:33
noprivwp_ajax_gecko_google_calendar_query_eventspublic\class-gecko-google-calendar-public.php:34

Shortcodes 2

[gecko_upcoming_events] public\class-gecko-google-calendar-public.php:30
[gecko_google_calendar] public\class-gecko-google-calendar-public.php:31
WordPress Hooks 9
actionadmin_menuadmin\class-gecko-google-calendar-admin.php:104
actionadmin_initadmin\class-gecko-google-calendar-admin.php:105
filtercron_schedulesincludes\class-gecko-google-calendar.php:143
actiongecko_google_calendar_pingincludes\class-gecko-google-calendar.php:157
actionplugins_loadedincludes\class-gecko-google-calendar.php:181
actionadmin_enqueue_scriptsincludes\class-gecko-google-calendar.php:189
actionadmin_enqueue_scriptsincludes\class-gecko-google-calendar.php:190
actionwp_enqueue_scriptsincludes\class-gecko-google-calendar.php:198
actionwp_enqueue_scriptsincludes\class-gecko-google-calendar.php:199

Scheduled Events 1

gecko_google_calendar_ping
Maintenance & Trust

Gecko Google Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedAug 13, 2018
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Gecko Google Calendar Developer Profile

musicalbigfoot

3 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gecko Google Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gecko-google-calendar/admin/css/gecko-google-calendar-admin.css/wp-content/plugins/gecko-google-calendar/admin/js/gecko-google-calendar-admin.js
Script Paths
https://apis.google.com/js/api.js
Version Parameters
gecko-google-calendar-admin.css?ver=gecko-google-calendar-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
gecko-google-calendar-admin-wrapgecko-google-calendar-oauth-wrapgecko-google-calendar-oauth-buttongecko-google-calendar-calendar-list
HTML Comments
<!-- BEGIN Gecko Google Calendar settings page -->
Data Attributes
data-plugin-name="Gecko_Google_Calendar"data-plugin-version="1.6.7"
JS Globals
gecko_google_calendar_admin_params
REST Endpoints
/wp-json/gecko-google-calendar/v1/settings
Shortcode Output
[gecko-google-calendar-upcoming-events]
FAQ

Frequently Asked Questions about Gecko Google Calendar