GET Params Security & Risk Analysis

wordpress.org/plugins/get-params

Shortcodes allowing you to display GET parameters from the current URL in pages and posts, or show/hide content depending on GET param values

1K active installs v1.1 PHP + WP 4.0+ Updated Jul 18, 2019
getparamsshortcodevars
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GET Params Safe to Use in 2026?

Generally Safe

Score 85/100

GET Params has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'get-params' plugin version 1.1 exhibits a strong security posture based on the provided static analysis. The code demonstrates excellent adherence to secure coding practices, with all SQL queries utilizing prepared statements and all output being properly escaped. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its robust security. Furthermore, the lack of any recorded vulnerabilities in its history is a positive indicator of diligent development and ongoing maintenance. The plugin also effectively minimizes its attack surface by not exposing any AJAX handlers or REST API routes without proper authentication or permission checks.

While the static analysis shows no immediate critical security flaws, the presence of three shortcodes as entry points without explicit capability checks, as indicated by the 'Capability checks: 0' signal, represents a potential area of concern. Although no taint flows were identified, shortcodes can sometimes be susceptible to injection if they process user-supplied data without adequate sanitization or validation before being rendered. The absence of nonce checks on these shortcodes also means that their functionality could theoretically be triggered by external requests, though the lack of identified dangerous functions and sanitized path issues mitigates this risk significantly in this specific analysis.

In conclusion, 'get-params' v1.1 appears to be a secure plugin with a strong foundation of good coding practices and a clean vulnerability history. The primary area for improvement lies in implementing capability checks for its shortcode entry points to further harden its security posture against potential misuse, even though the current analysis does not reveal active vulnerabilities.

Key Concerns

  • Shortcodes without capability checks
  • Shortcodes without nonce checks
Vulnerabilities
None known

GET Params Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GET Params Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

GET Params Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[display-get-param] wp_get_params.php:75
[display-if-get] wp_get_params.php:76
[display-if-not-get] wp_get_params.php:77
Maintenance & Trust

GET Params Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 18, 2019
PHP min version
Downloads12K

Community Trust

Rating100/100
Number of ratings15
Active installs1K
Developer Profile

GET Params Developer Profile

Nathan Singh

1 plugin · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GET Params

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<b>display-get-param requires a name attribute</b><b>display-get-param must have opening and closing tags</b><b>display-if-get requires a name attribute</b><b>display-if-get must have opening and closing tags</b>
FAQ

Frequently Asked Questions about GET Params