Google+ Interactive Posts Security & Risk Analysis

wordpress.org/plugins/google-interactive-posts

Enable Google+ interactive posts on your website in a few simple steps.

10 active installs v1.0 PHP + WP 3.0.1+ Updated May 14, 2015
googleinteractivepostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google+ Interactive Posts Safe to Use in 2026?

Generally Safe

Score 85/100

Google+ Interactive Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'google-interactive-posts' plugin version 1.0 presents a mixed security posture. On the positive side, it demonstrates good practices by not exposing a large attack surface through AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are correctly using prepared statements, and there are no known vulnerabilities in its history, suggesting a relatively stable and well-maintained codebase in the past.

However, significant concerns arise from the static analysis. The presence of the `unserialize` function, especially without clear sanitization or validation, poses a high risk for potential remote code execution or object injection vulnerabilities. Compounding this, the analysis indicates unsanitized paths in taint flows, which, when combined with dangerous functions like `unserialize`, creates a critical pathway for exploitation. The fact that 100% of output is unescaped is another major red flag, leaving the plugin vulnerable to Cross-Site Scripting (XSS) attacks through user-controlled input being directly rendered on the page.

While the plugin has no recorded CVEs, the identified code signals point to serious potential weaknesses. The lack of nonces on any entry points, the complete lack of output escaping, and the dangerous use of `unserialize` are significant security flaws. The plugin's strength lies in its minimal attack surface and secure database interactions, but its handling of user input and potentially dangerous functions requires immediate attention to mitigate severe risks.

Key Concerns

  • Unsanitized taint flow with dangerous functions
  • 100% of output unescaped
  • Dangerous function: unserialize used
  • 0 nonce checks on entry points
Vulnerabilities
None known

Google+ Interactive Posts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Google+ Interactive Posts Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
19
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$GoogleInteractivePostsPostMeta = unserialize($meta_values);index.php:53
unserialize$GoogleInteractivePostsPostMeta = unserialize($post_meta_values);index.php:235

Output Escaping

0% escaped19 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
GoogleInteractivePosts_main_function (index.php:313)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Google+ Interactive Posts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadd_meta_boxesindex.php:12
actionsave_postindex.php:13
filterthe_contentindex.php:226
actionwp_footerindex.php:280
actionwp_enqueue_scriptsindex.php:288
actionadmin_enqueue_scriptsindex.php:300
actionadmin_menuindex.php:307
actionadmin_noticesindex.php:348
Maintenance & Trust

Google+ Interactive Posts Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 14, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Google+ Interactive Posts Developer Profile

DEJAN

3 plugins · 80 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Google+ Interactive Posts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/google-interactive-posts/google-interactive-posts.css/wp-content/plugins/google-interactive-posts/google-interactive-posts.js
Script Paths
/wp-content/plugins/google-interactive-posts/google-interactive-posts.js
Version Parameters
google-interactive-posts/google-interactive-posts.css?ver=google-interactive-posts/google-interactive-posts.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- google interactive posts -->
Data Attributes
data-gip-iddata-gip-titledata-gip-urldata-gip-imagedata-gip-descriptiondata-gip-button-text+1 more
JS Globals
GoogleInteractivePosts
Shortcode Output
<a href="javascript:void(0);" class="gip-share-button"><span class="gip-button-icon"></span><span class="gip-button-text">
FAQ

Frequently Asked Questions about Google+ Interactive Posts