Geo-Target Dragon Radar Security & Risk Analysis

wordpress.org/plugins/geo-target-dragon-radar

Plugin ULTRA Léger permettant d'afficher la localisation de l'internaute via son adresse IP pour augmenter votre taux de transformation.

10 active installs v1.0.1 PHP 7.4.0+ WP 6.0+ Updated Dec 5, 2025
geolocalisationgeolocalize-ipgeotargetingip
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Geo-Target Dragon Radar Safe to Use in 2026?

Generally Safe

Score 100/100

Geo-Target Dragon Radar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The geo-target-dragon-radar plugin v1.0.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries and output escaping, ensuring these common attack vectors are handled securely. The absence of known CVEs and a clean vulnerability history suggests a relatively stable and well-maintained codebase historically.

However, the static analysis reveals significant concerns. The presence of two 'unserialize' calls is a critical red flag, as unserialization of untrusted data is a well-known vulnerability that can lead to remote code execution. Coupled with this, the taint analysis indicates two flows with unsanitized paths, both flagged as high severity. This suggests that data flowing into the plugin might not be adequately validated or sanitized before being processed, potentially exacerbating the risks associated with 'unserialize' or other functions.

While the attack surface is small and there are no publicly known vulnerabilities, the potential for serious issues stemming from deserialization and unsanitized data flows warrants caution. The plugin's strengths in SQL and output handling are overshadowed by the high-risk indicators in its code analysis. A thorough security audit focusing on the 'unserialize' functions and the identified unsanitized taint flows is highly recommended.

Key Concerns

  • Dangerous function 'unserialize' used
  • High severity unsanitized taint flows (x2)
  • No nonce checks on entry points
Vulnerabilities
None known

Geo-Target Dragon Radar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Geo-Target Dragon Radar Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize($response);geoplugin.class.php:92
unserializereturn unserialize( $this->fetch($host) );geoplugin.class.php:174

Output Escaping

100% escaped1 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
locate (geoplugin.class.php:76)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Geo-Target Dragon Radar Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dragonradar] dragonradar.php:63
WordPress Hooks 4
actionplugins_loadeddragonradar.php:22
filtermce_external_pluginsdragonradar.php:73
filtermce_buttonsdragonradar.php:74
actionadmin_initdragonradar.php:82
Maintenance & Trust

Geo-Target Dragon Radar Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 5, 2025
PHP min version7.4.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Geo-Target Dragon Radar Developer Profile

Kapsule Corp

7 plugins · 200 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
2 days
View full developer profile
Detection Fingerprints

How We Detect Geo-Target Dragon Radar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/geo-target-dragon-radar/tinymscript.js

HTML / DOM Fingerprints

Shortcode Output
[dragonradar
FAQ

Frequently Asked Questions about Geo-Target Dragon Radar