Google+ for Page Security & Risk Analysis

wordpress.org/plugins/google-for-page

Add the Google+ Badge or Icon to your website to increase engagement and create a lasting connection with your audience.

10 active installs v1.1 PHP + WP 3.0+ Updated Nov 10, 2011
badgegooglegoogle-plusicon
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google+ for Page Safe to Use in 2026?

Generally Safe

Score 85/100

Google+ for Page has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin "google-for-page" v1.1 exhibits a generally good security posture in terms of its attack surface and SQL handling. The absence of known vulnerabilities and CVEs, coupled with the use of prepared statements for all SQL queries, are positive indicators. However, the static analysis reveals significant concerns, particularly regarding output escaping. With 0% of outputs properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities, which could allow attackers to inject malicious scripts into the website. The presence of the `create_function` dangerous function, although not tied to an evident taint flow in this analysis, represents a potential risk for insecure code execution if not handled with extreme care. The lack of nonce and capability checks, while not directly linked to a large attack surface in this specific version, is a fundamental security practice that is missing and could be exploited if new entry points are introduced or if existing ones are combined with other vulnerabilities. The vulnerability history being clean is a strength, suggesting the plugin has been developed with security in mind or has had past issues addressed. However, the current static analysis findings, especially the unescaped output, introduce considerable risk that needs immediate attention.

Key Concerns

  • 0% of outputs properly escaped
  • Dangerous function 'create_function' found
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Google+ for Page Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Google+ for Page Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
35
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("GooglePlusPageWidget");') )google-plus-page.php:217

Output Escaping

0% escaped35 total outputs
Attack Surface

Google+ for Page Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initgoogle-plus-page.php:217
actionwp_headgoogle-plus-page.php:260
Maintenance & Trust

Google+ for Page Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedNov 10, 2011
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Google+ for Page Developer Profile

Darko Mitrovic

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Google+ for Page

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
GooglePlusPageWidget
Data Attributes
id="GooglePlusPageWidget"name="GooglePlusPageWidget"
FAQ

Frequently Asked Questions about Google+ for Page