Get Data Security & Risk Analysis

wordpress.org/plugins/get-data

By using Get Data Plugin, you can get content by URL and insert data in header or footer.

10 active installs v1.4 PHP + WP 3.0+ Updated Dec 4, 2022
contentdatafootergetheader
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Get Data Safe to Use in 2026?

Generally Safe

Score 85/100

Get Data has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'get-data' plugin v1.4 exhibits a generally good security posture due to the absence of known vulnerabilities, critical taint flows, and dangerous functions. The code adheres to secure practices by exclusively using prepared statements for SQL queries. However, a significant concern arises from the complete lack of output escaping for all 21 identified outputs. This suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data, if it reaches these output points, will not be sanitized. While the plugin has a clean vulnerability history and no recorded CVEs, this positive track record could be misleading given the critical flaw in output handling. The presence of file operations and a capability check without accompanying nonce checks on AJAX handlers (which are absent) also introduces potential risks if the functionality exposed by these file operations is not carefully controlled.

Key Concerns

  • All outputs are unescaped.
  • No nonce checks on entry points.
  • Capability checks present, but unclear context.
Vulnerabilities
None known

Get Data Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Get Data Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped21 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
getting_data_options (get-data.php:127)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Get Data Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_headget-data.php:37
actionget_headerget-data.php:118
actionget_footerget-data.php:119
actionadmin_menuget-data.php:121
Maintenance & Trust

Get Data Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedDec 4, 2022
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Get Data Developer Profile

edckwt

13 plugins · 520 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Get Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/get-data/i/data.png

HTML / DOM Fingerprints

CSS Classes
gettingdatacontent_header
Data Attributes
id="gettingdata"class="submit"class="dbx-content"class="content_header"
Shortcode Output
<h2>Get data</h2><input type="hidden" name="submitted" value="1" /><input style="width:70%;" id="get_da
FAQ

Frequently Asked Questions about Get Data