Global Setting Security & Risk Analysis

wordpress.org/plugins/global-settings

Global Setting allows you to add, update and delete the global variables for your blog. Get Paid version at : http://just4u.x10.bz/global

100 active installs v1.1 PHP + WP 2.0.2+ Updated Mar 3, 2013
customcustom-global-fieldsglobalglobal-settingsettings
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Global Setting Safe to Use in 2026?

Generally Safe

Score 85/100

Global Setting has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "global-settings" plugin v1.1 exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs), no bundled libraries, and no external HTTP requests, which are all excellent indicators of good security hygiene. The attack surface is also minimal, with only one shortcode and no AJAX handlers or REST API routes that are exposed without authentication checks.

However, the static analysis reveals significant concerns regarding data handling. Specifically, the plugin performs SQL queries without using prepared statements, which is a critical vulnerability that could lead to SQL injection. Furthermore, all output is unescaped, presenting a high risk of cross-site scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks on its entry points, combined with the lack of taint analysis data, suggests a potential for other unaddressed security flaws, especially if the shortcode handler is not robustly secured.

Given the lack of historical vulnerabilities, it's possible the plugin has not been extensively targeted or that its limited functionality has not exposed deeper issues. Nonetheless, the identified SQL and XSS risks are severe and require immediate attention. The plugin's strengths lie in its minimal attack surface and clean vulnerability history, but these are overshadowed by critical flaws in data sanitization and secure coding practices.

Key Concerns

  • Raw SQL queries without prepared statements
  • No output escaping for any output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Global Setting Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Global Setting Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped4 total outputs
Attack Surface

Global Setting Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[global] gbs.php:36
WordPress Hooks 1
actionadmin_menugbs.php:35
Maintenance & Trust

Global Setting Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMar 3, 2013
PHP min version
Downloads3K

Community Trust

Rating80/100
Number of ratings4
Active installs100
Developer Profile

Global Setting Developer Profile

victor4g

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Global Setting

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/global-settings/download.png

HTML / DOM Fingerprints

Shortcode Output
global
FAQ

Frequently Asked Questions about Global Setting