Gmail Comment Approval Security & Risk Analysis

wordpress.org/plugins/gmail-comment-approval

One click comment approval for Wordpress from your Gmail account.

10 active installs v0.1 PHP + WP 3.0+ Updated Mar 16, 2014
comment-moderationgmail-actions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Gmail Comment Approval Safe to Use in 2026?

Generally Safe

Score 85/100

Gmail Comment Approval has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "gmail-comment-approval" plugin version 0.1 exhibits a poor security posture primarily due to its unprotected entry points. While the static analysis indicates no dangerous functions, SQL injection vulnerabilities, or unescaped output, the presence of two AJAX handlers that lack any authentication or capability checks represents a significant risk. This means any unauthenticated user could potentially trigger these handlers, leading to unintended actions or information disclosure.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the absence of complex code signals like file operations or external HTTP requests, suggests a relatively simple plugin. However, this lack of complexity doesn't excuse the missing security controls on its exposed functionality. The absence of nonces on AJAX handlers is a direct invitation for cross-site request forgery (CSRF) attacks.

In conclusion, the plugin has a good foundation in terms of not utilizing risky coding practices like raw SQL or unescaped output. However, the critical omission of authorization and nonce checks on its AJAX endpoints creates a substantial attack surface that could be exploited. Until these fundamental security measures are implemented, the plugin remains highly vulnerable to common web attacks.

Key Concerns

  • Unprotected AJAX handlers
  • Missing nonce checks on AJAX handlers
Vulnerabilities
None known

Gmail Comment Approval Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Gmail Comment Approval Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface
2 unprotected

Gmail Comment Approval Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

noprivwp_ajax_gia_approve_commentapp\GmailInboxAction.php:20
authwp_ajax_gia_approve_commentapp\GmailInboxAction.php:21
WordPress Hooks 5
actioncomment_postapp\GmailInboxAction.php:22
actionwp_set_comment_statusapp\GmailInboxAction.php:23
filtercomment_moderation_textapp\GmailInboxAction.php:174
filterwp_mail_content_typeapp\GmailInboxAction.php:175
actioninitindex.php:30
Maintenance & Trust

Gmail Comment Approval Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 16, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Gmail Comment Approval Developer Profile

Umesh Kumar

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gmail Comment Approval

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<script type="application/ld+json"> { "@context": "http://schema.org", "@type": "EmailMessage", "action": { "@type": "ConfirmAction", "name": "Approve Comment", "handler": { "@type": "HttpActionHandler", "url": "?action=gia_approve_comment&id=&token=", "method": "POST" } }, "description": "Approval request for comment" } </script>
FAQ

Frequently Asked Questions about Gmail Comment Approval