Globaliser Security & Risk Analysis

wordpress.org/plugins/globaliser

This plugin enables Globaliser Cloud's services for Globaliser clients' WordPress sites.

20 active installs v0.9.14 PHP 8.1+ WP 4.6+ Updated Feb 25, 2026
cachecloudoptimizationsecurityspeed
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Globaliser Safe to Use in 2026?

Generally Safe

Score 100/100

Globaliser has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "globaliser" plugin v0.9.14 demonstrates a strong security posture based on the provided static analysis. The absence of dangerous functions, the exclusive use of prepared statements for all SQL queries, and 100% proper output escaping are significant strengths. Furthermore, the plugin's attack surface is minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. The lack of any recorded vulnerabilities, including CVEs, further contributes to a positive security assessment.

However, there are a couple of areas that warrant attention. The plugin has zero nonce checks, which is a concern for functionalities that might be triggered by user interaction. While the static analysis indicates no exploitable taint flows and a clean vulnerability history, the absence of nonce checks can still leave the door open for certain types of attacks if specific endpoints were to be added in the future without proper protection. The plugin also makes external HTTP requests, which, while not inherently insecure, introduces a dependency on external services that could potentially be compromised or unavailable.

In conclusion, "globaliser" v0.9.14 is a generally secure plugin, excelling in core security practices like prepared statements and output escaping, and benefiting from a minimal attack surface and no known vulnerabilities. The primary weakness lies in the complete absence of nonce checks, which, combined with the potential for future expansion of its attack surface, represents the most significant area for improvement. The external HTTP requests are a minor concern that should be monitored but do not represent an immediate, critical risk.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Globaliser Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Globaliser Release Timeline

v0.9.14Current
v0.9.13
v0.9.12
v0.9.11
v0.9.10
v0.9.9
v0.9.8
v0.9.7
v0.9.6
v0.9.5
v0.9.4
v0.9.3
v0.9.2
v0.9.1
v0.9.0
Code Analysis
Analyzed Mar 16, 2026

Globaliser Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
0
14 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
4
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

100% escaped14 total outputs
Attack Surface

Globaliser Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Globaliser Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedFeb 25, 2026
PHP min version8.1
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Globaliser Developer Profile

Globaliser

2 plugins · 40 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Globaliser

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/globaliser/assets/js/globaliser.js
Script Paths
/wp-content/plugins/globaliser/assets/js/globaliser.js
Version Parameters
globaliser/assets/js/globaliser.js?ver=

HTML / DOM Fingerprints

CSS Classes
globaliser-topnav-clear-cache
JS Globals
GLOBALISER
FAQ

Frequently Asked Questions about Globaliser