Gleam: Run Competitions on Your WordPress Blog Security & Risk Analysis

wordpress.org/plugins/gleam

An amazing solution to run competitions on your blog using combinations of social actions.

200 active installs v1.0 PHP + WP 3.0+ Updated May 23, 2018
contestfacebookinstagramsocial-mediatwitter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gleam: Run Competitions on Your WordPress Blog Safe to Use in 2026?

Generally Safe

Score 85/100

Gleam: Run Competitions on Your WordPress Blog has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "gleam" v1.0 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The code analysis reveals no dangerous functions, SQL injection vulnerabilities, or file operations, with all SQL queries utilizing prepared statements and all outputs being properly escaped. The plugin also shows no external HTTP requests and no evident vulnerabilities in its vulnerability history, suggesting a well-maintained and secure codebase. The absence of critical or high-severity taint flows further reinforces this positive assessment.

However, a potential area of concern is the lack of nonce and capability checks. While the attack surface is currently small with only one shortcode, the absence of these fundamental security checks means that if this shortcode were to perform any sensitive actions or accept user-provided data that is not strictly validated and escaped at the point of use, it could potentially be exploited. The overall conclusion is that "gleam" v1.0 appears to be a secure plugin with excellent coding practices, but the oversight in implementing nonce and capability checks represents a minor weakness that could be addressed.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Gleam: Run Competitions on Your WordPress Blog Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gleam: Run Competitions on Your WordPress Blog Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Gleam: Run Competitions on Your WordPress Blog Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gleam] gleam.php:11
Maintenance & Trust

Gleam: Run Competitions on Your WordPress Blog Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 23, 2018
PHP min version
Downloads10K

Community Trust

Rating60/100
Number of ratings4
Active installs200
Developer Profile

Gleam: Run Competitions on Your WordPress Blog Developer Profile

stuartmck

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gleam: Run Competitions on Your WordPress Blog

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gleam/e.js
Script Paths
//js.gleam.io/e.js

HTML / DOM Fingerprints

CSS Classes
e-gleam
Shortcode Output
<a class="e-gleam"
FAQ

Frequently Asked Questions about Gleam: Run Competitions on Your WordPress Blog