Get Options Security & Risk Analysis

wordpress.org/plugins/get-options

View all the WordPress Options

40 active installs v2.7.0 PHP + WP 3.2.1+ Updated Feb 2, 2025
admindebugoptionstool
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Get Options Safe to Use in 2026?

Generally Safe

Score 92/100

Get Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'get-options' plugin version 2.7.0 exhibits a mixed security posture. On the positive side, the attack surface appears to be minimal, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events exposed. The absence of known CVEs and a clean vulnerability history is also a strong indicator of past security diligence. However, the static analysis reveals significant areas of concern that detract from an otherwise positive outlook.

The presence of the `unserialize` function, coupled with a complete lack of nonce checks and capability checks, presents a high-risk scenario. If serialized data is processed by this function without proper sanitization and authentication, it could lead to arbitrary object injection vulnerabilities, allowing an attacker to execute malicious code or gain unauthorized access. Furthermore, the plugin uses raw SQL queries without prepared statements, which opens it up to SQL injection vulnerabilities. While the percentage of unescaped output is not critically high, it still presents a potential avenue for cross-site scripting (XSS) attacks. The absence of taint analysis data is notable but doesn't negate the risks identified through code signals and function usage.

In conclusion, while the plugin's attack surface and historical vulnerability record are reassuring, the direct use of dangerous functions like `unserialize` without corresponding security controls (nonces, capabilities) and the lack of prepared statements for SQL queries represent critical security weaknesses. These specific code-level risks require immediate attention to mitigate the potential for severe exploitation.

Key Concerns

  • Dangerous function unserialize without auth/nonce
  • SQL queries without prepared statements
  • Unescaped output present
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Get Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Get Options Release Timeline

v2.7.0Current
v2.6.0
v2.5
v2.4.0
v2.3.0
v2.2.0
v2.1.0
v2.0.0
v1.1.9
v1.1.6
v1.1.5
v1.1.4
v1.1.3
v1.1.2
v1.1.1
v1.1.0
Code Analysis
Analyzed Mar 16, 2026

Get Options Code Analysis

Dangerous Functions
2
Raw SQL Queries
2
0 prepared
Unescaped Output
18
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$my_value = unserialize($option->option_value); // pre($value);inc\page-content.php:118
unserialize$my_value = unserialize($option->option_value); // pre($value);trunk\inc\page-content.php:118

SQL Query Safety

0% prepared2 total queries

Output Escaping

40% escaped30 total outputs
Attack Surface

Get Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuget-options.php:27
actionadmin_menutrunk\get-options.php:27
Maintenance & Trust

Get Options Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 2, 2025
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings3
Active installs40
Developer Profile

Get Options Developer Profile

gilles66

3 plugins · 4K total installs

73
trust score
Avg Security Score
92/100
Avg Patch Time
268 days
View full developer profile
Detection Fingerprints

How We Detect Get Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/get-options/css//wp-content/plugins/get-options/js/
Script Paths
/wp-content/plugins/get-options/js/get-options.js
Version Parameters
get-options/js/get-options.js?ver=

HTML / DOM Fingerprints

CSS Classes
gwp_options_tablegwp_options_searchgwp_option_namegwp_option_value
Data Attributes
data-option-namedata-option-value
JS Globals
get_options_ajax_object
FAQ

Frequently Asked Questions about Get Options