GMap Targeting – Simple Targeting Inside Google Maps Security & Risk Analysis

wordpress.org/plugins/gmap-targeting

Set Google Map everywhere by shortcode on your WordPress site simply. One click - one map! This lightweight plugin is managed in an intuitive way.

70 active installs v1.1.8 PHP + WP 3.5.0+ Updated Dec 5, 2025
googlegoogle-mapmappagepost
94
A · Safe
CVEs total2
Unpatched0
Last CVEFeb 5, 2026
Safety Verdict

Is GMap Targeting – Simple Targeting Inside Google Maps Safe to Use in 2026?

Generally Safe

Score 94/100

GMap Targeting – Simple Targeting Inside Google Maps has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

2 known CVEsLast CVE: Feb 5, 2026Updated 5mo ago
Risk Assessment

The gmap-targeting plugin v1.1.8 exhibits a mixed security posture. While it demonstrates good practices by utilizing prepared statements for all SQL queries and includes nonce and capability checks on its single AJAX entry point, significant concerns arise from its output escaping and historical vulnerability data. Only 3% of outputs are properly escaped, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's history of XSS CVEs. The presence of file operations and external HTTP requests, without explicit mention of sanitization in the static analysis, also warrants caution.

The vulnerability history is a major red flag. The plugin has a past of two high-severity CVEs, including Cross-Site Scripting and PHP Remote File Inclusion, with the most recent recorded vulnerability in 2026. Although currently unpatched CVEs are reported as 0, the recurrence of critical vulnerability types and the relatively recent past vulnerability indicate potential for future exploitable flaws. This history, coupled with the poor output escaping, creates a significant risk profile.

In conclusion, while the plugin has made some positive strides in secure coding practices like prepared statements and basic authentication checks, the pervasive lack of output escaping and the history of severe vulnerabilities, particularly PHP Remote File Inclusion and XSS, present a substantial security risk. Users should be extremely cautious and ensure the plugin is updated to the latest version, as the historical data suggests a pattern of exploitable weaknesses.

Key Concerns

  • Low output escaping percentage (3%)
  • History of High severity CVEs (2)
  • History of XSS vulnerability type
  • History of PHP Remote File Inclusion vulnerability type
  • Recent vulnerability date (2026-02-05)
Vulnerabilities
2 published

GMap Targeting – Simple Targeting Inside Google Maps Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

High
2

2 total CVEs

CVE-2025-67990high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

GMap Targeting <= 1.1.7 - Unauthenticated Stored Cross-Site Scripting

Feb 5, 2026 Patched in 1.1.8 (5d)
CVE-2025-52732high · 7.5Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Google Map Targeting <= 1.1.6 - Authenticated (Subscriber+) Local File Inclusion

Jul 31, 2025 Patched in 1.1.7 (5d)
Version History

GMap Targeting – Simple Targeting Inside Google Maps Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

GMap Targeting – Simple Targeting Inside Google Maps Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
152
5 escaped
Nonce Checks
1
Capability Checks
1
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

3% escaped157 total outputs
Attack Surface

GMap Targeting – Simple Targeting Inside Google Maps Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_gmap_targeting_get_shortcode_templateindex.php:39
WordPress Hooks 6
actionwp_headindex.php:35
actionadmin_headindex.php:36
filtermce_buttonsindex.php:87
filtermce_external_pluginsindex.php:88
actioninitindex.php:407
actionwidgets_initindex.php:408
Maintenance & Trust

GMap Targeting – Simple Targeting Inside Google Maps Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 5, 2025
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings1
Active installs70
Developer Profile

GMap Targeting – Simple Targeting Inside Google Maps Developer Profile

RealMag777

12 plugins · 188K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
196 days
View full developer profile
Detection Fingerprints

How We Detect GMap Targeting – Simple Targeting Inside Google Maps

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gmap-targeting/css/admin.css/wp-content/plugins/gmap-targeting/css/shortcodes.css/wp-content/plugins/gmap-targeting/js/admin.js/wp-content/plugins/gmap-targeting/js/editor.js/wp-content/plugins/gmap-targeting/js/wp38/editor.js/wp-content/plugins/gmap-targeting/js/pn_popup/pn_advanced_wp_popup.js/wp-content/plugins/gmap-targeting/js/pn_popup/styles.css
Script Paths
https://maps.google.com/maps/api/js?sensor=false
Version Parameters
gmap-targeting/style.css?ver=gmap-targeting/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
gmap_targeting_icon
HTML Comments
<!-- 05-12-2025 -->
Data Attributes
gmap_targeting
JS Globals
gmap_targeting_ajaxpn_gmt_plugin_urlpn_lang_loadinggmt_lang_insertgmt_lang_popup_titlegmt_lang_made_by+2 more
Shortcode Output
[gmap_targeting]gmap_targeting
FAQ

Frequently Asked Questions about GMap Targeting – Simple Targeting Inside Google Maps