GeoMeta For ACF Security & Risk Analysis

wordpress.org/plugins/geometa-acf

Store real spatial data with Advanced Custom Fields, using the WP-GeoMeta library.

100 active installs v0.0.4 PHP + WP 4.4.0+ Updated Mar 4, 2017
acfadvanced-custom-fieldsgeogisspatial
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GeoMeta For ACF Safe to Use in 2026?

Generally Safe

Score 85/100

GeoMeta For ACF has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The geometa-acf plugin version 0.0.4 exhibits a strong overall security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength, limiting the attack surface to zero. Furthermore, the code's adherence to prepared statements for all SQL queries is excellent, mitigating the risk of SQL injection vulnerabilities. The lack of identified critical or high severity taint flows and a clean vulnerability history with zero known CVEs are also highly positive indicators.

However, there are areas for concern. The output escaping is only properly implemented in 64% of cases, leaving a significant portion of outputs potentially vulnerable to Cross-Site Scripting (XSS) attacks. The complete absence of nonce checks and capability checks across all code signals a lack of fundamental security measures that are crucial for protecting against common WordPress attacks, especially if the attack surface were to grow in future versions or if new entry points were introduced. The presence of file operations, while not explicitly flagged as problematic, warrants attention as they can sometimes be exploited if not handled with extreme care and proper sanitization.

In conclusion, geometa-acf v0.0.4 demonstrates a commendable effort in preventing common web vulnerabilities like SQL injection and limiting its direct attack surface. Its clean vulnerability history suggests responsible development. Nevertheless, the significant number of unescaped outputs and the complete absence of nonce and capability checks represent critical security gaps that could be exploited, particularly if the plugin's functionality evolves. Addressing these specific weaknesses should be a priority to achieve a more robust security profile.

Key Concerns

  • Insufficient output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

GeoMeta For ACF Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GeoMeta For ACF Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
22 prepared
Unescaped Output
10
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared22 total queries

Output Escaping

64% escaped28 total outputs
Attack Surface

GeoMeta For ACF Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionacf/include_field_typesgeometa-acf.php:55
actionacf/register_fieldsgeometa-acf.php:56
actionplugins_loadedwp-geometa-lib\wp-geometa-lib-loader.php:96
filterwpgm_pre_metaval_to_geomwp-geometa-lib\wp-geometa.php:116
filterwpgm_populate_geo_tableswp-geometa-lib\wp-geometa.php:117
filterwpgm_pre_delete_geometawp-geometa-lib\wp-geometa.php:118
filterwpgm_extra_sql_functionswp-geometa-lib\wp-geometa.php:119
actionget_meta_sqlwp-geometa-lib\wp-geoquery.php:65
actionplugins_loadedwp-geometa-lib\wp-geoutil.php:255
Maintenance & Trust

GeoMeta For ACF Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 4, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

GeoMeta For ACF Developer Profile

Michael Moore

4 plugins · 150 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GeoMeta For ACF

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/geometa-acf/css/geometa-acf.css/wp-content/plugins/geometa-acf/js/geometa-acf.js
Script Paths
/wp-content/plugins/geometa-acf/js/geometa-acf.js
Version Parameters
geometa-acf/css/geometa-acf.css?ver=geometa-acf/js/geometa-acf.js?ver=

HTML / DOM Fingerprints

CSS Classes
acf-field-geometa
Data Attributes
name="geometa"data-input_type="map"data-input_type="latlng"data-input_type="geojson"
JS Globals
acf_geometa_params
FAQ

Frequently Asked Questions about GeoMeta For ACF