GeniiPress Auto Pinch Zoom Security & Risk Analysis

wordpress.org/plugins/geniipress-auto-pinch-zoom

Enables pinch zoom functionality for mobile devices, automagically.

20 active installs v1.0.0 PHP 5.2.4+ WP 5.0.3+ Updated Feb 20, 2019
pinchpinch-zoompinchzoomzoom
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GeniiPress Auto Pinch Zoom Safe to Use in 2026?

Generally Safe

Score 85/100

GeniiPress Auto Pinch Zoom has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

Based on the static analysis, the geniipress-auto-pinch-zoom v1.0.0 plugin exhibits a strong security posture. The absence of any identified dangerous functions, SQL queries without prepared statements, or unescaped output are all positive indicators. The lack of file operations and external HTTP requests further reduces the potential for common attack vectors. Crucially, the analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the plugin's attack surface. This lack of entry points, coupled with no identified vulnerabilities in taint analysis, suggests a well-secured codebase at this version.

The plugin's vulnerability history is also clear, with zero known CVEs recorded. This pattern, combined with the clean code analysis, indicates a commitment to security or simply a lack of exposure to exploitation. However, the complete absence of any capability checks or nonce checks, while not directly exploitable given the zero attack surface, represents a potential weakness. Should future versions introduce new entry points without implementing these fundamental WordPress security checks, it could create significant vulnerabilities. Therefore, while currently secure, the plugin's future security will depend on diligent implementation of authentication and authorization mechanisms as its functionality evolves.

Key Concerns

  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

GeniiPress Auto Pinch Zoom Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GeniiPress Auto Pinch Zoom Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

GeniiPress Auto Pinch Zoom Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headgeniipress-auto-pinch-zoom.php:32
Maintenance & Trust

GeniiPress Auto Pinch Zoom Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedFeb 20, 2019
PHP min version5.2.4
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

GeniiPress Auto Pinch Zoom Developer Profile

GeniiPress

3 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GeniiPress Auto Pinch Zoom

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/geniipress-auto-pinch-zoom/
Version Parameters
geniipress-auto-pinch-zoom/style.css?ver=

HTML / DOM Fingerprints

Shortcode Output
<meta name="viewport" content="width=device-width, user-scalable=yes, initial-scale=1.0, minimum-scale=0.1, maximum-scale=10.0">
FAQ

Frequently Asked Questions about GeniiPress Auto Pinch Zoom