Auto Post to Google+ Security & Risk Analysis

wordpress.org/plugins/google-auto-post

Update: Google has closed the loophole and this plugin no longer works. Please check out Automattic's JetPack, which includes a module for auto-p …

40 active installs v1.0 PHP + WP 3.0.1+ Updated Sep 16, 2014
googlepostsharingsocial-media
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Post to Google+ Safe to Use in 2026?

Generally Safe

Score 85/100

Auto Post to Google+ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The static analysis of the "google-auto-post" v1.0 plugin reveals a generally positive security posture. There are no identified dangerous functions, no raw SQL queries, and a reasonable number of capability checks and nonce checks present. The absence of file operations and external HTTP requests also reduces the potential attack surface. However, the analysis indicates that only 50% of output is properly escaped, which presents a potential risk of cross-site scripting (XSS) vulnerabilities if user-controlled data is not handled with sufficient sanitization before being rendered in the browser. The plugin also has a limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, which is a strength.

The taint analysis shows no identified flows, which is a good sign that sensitive data is not being mishandled within the plugin's code. The vulnerability history is also clean, with no recorded CVEs, suggesting a history of security diligence. Despite the lack of critical findings, the unescaped output remains a concern that should be addressed to ensure a more robust security profile. Overall, the plugin demonstrates good practices in many areas, but the identified output escaping issue warrants attention.

Key Concerns

  • Output escaping only 50% proper
Vulnerabilities
None known

Auto Post to Google+ Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Post to Google+ Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

Auto Post to Google+ Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initergplus-autopost.php:10
actionadmin_menuergplus-autopost.php:11
actionadd_meta_boxesergplus-autopost.php:77
actionsave_postergplus-autopost.php:81
filterwp_mail_fromergplus-autopost.php:135
actionpublish_postergplus-autopost.php:139
actionpublish_postergplus-autopost.php:140
actionphpmailer_initergplus-autopost.php:161
Maintenance & Trust

Auto Post to Google+ Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 16, 2014
PHP min version
Downloads21K

Community Trust

Rating70/100
Number of ratings6
Active installs40
Developer Profile

Auto Post to Google+ Developer Profile

Edward R. Jenkins

2 plugins · 640 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Post to Google+

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="ergplus[autopub]"name="ergplus[gvaddress]"name="ergplus[associatedemail]"id="ergplus_status"name="ergplus_status"name="ergplus_noncename"
Shortcode Output
<textarea id="ergplus_status" name="ergplus_status" rows="5" cols="27"></textarea><br>
FAQ

Frequently Asked Questions about Auto Post to Google+