GetReview Security & Risk Analysis

wordpress.org/plugins/getreview

Collect reviews from customers who made purchases in the store! Reward them for opinions with a photo. Show reviews on product page.

10 active installs v2.0 PHP 7.2+ WP 5.1+ Updated Jul 8, 2020
opinionsreviewssocial-prooftestimonialswoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GetReview Safe to Use in 2026?

Generally Safe

Score 85/100

GetReview has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "getreview" plugin version 2.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices in handling SQL queries, utilizing prepared statements exclusively, and reports no known vulnerabilities (CVEs) or bundled libraries, which can often introduce risks. However, significant concerns arise from the static analysis. The plugin has one REST API route that lacks permission callbacks, creating an unprotected entry point into the application. Furthermore, the output escaping is insufficient, with only 40% of outputs properly escaped, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities. The presence of a taint flow with unsanitized paths, although not flagged as critical or high severity, warrants attention as it could potentially lead to unintended behavior or security issues if exploited.

Key Concerns

  • REST API route without permission callback
  • Insufficient output escaping (40% proper)
  • Taint flow with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

GetReview Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GetReview Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
6
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

40% escaped10 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<admin.template> (includes\admin.template.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

GetReview Attack Surface

Entry Points2
Unprotected1

REST API Routes 1

GET/wp-json/getreview/v2/update/gr-connect.php:45

Shortcodes 1

[getreview] gr-connect.php:16
WordPress Hooks 9
actioninitgetreview.php:24
actionplugins_loadedgetreview.php:28
actionadmin_menugr-admin.php:7
actionadmin_headgr-admin.php:8
actionrest_api_initgr-connect.php:7
actionwoocommerce_review_order_before_submitgr-connect.php:8
actionwoocommerce_checkout_update_order_metagr-connect.php:9
actionadmin_headgr-connect.php:10
actionget_footergr-connect.php:13
Maintenance & Trust

GetReview Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedJul 8, 2020
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GetReview Developer Profile

refericon

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GetReview

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/getreview/gr-connect.php/wp-content/plugins/getreview/gr-admin.php

HTML / DOM Fingerprints

JS Globals
window.grw
REST Endpoints
/getreview/v2/update/
Shortcode Output
<div id="gr-widget"></div><script>(function() { var s=document.createElement("script");s.src="//app.getreview.pl/widget/app.js";s.async=true; window.grw = {id:"
FAQ

Frequently Asked Questions about GetReview