
Google+ Follow Box Security & Risk Analysis
wordpress.org/plugins/google-plus-badge-like-fb-like-boxGoogle+ Badge / Follow Box Widget like FB Like Box
Is Google+ Follow Box Safe to Use in 2026?
Generally Safe
Score 85/100Google+ Follow Box has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "google-plus-badge-like-fb-like-box" plugin v0.1.8 exhibits a concerning security posture, primarily due to significant weaknesses in output handling and the presence of a deprecated and potentially dangerous function. While the static analysis indicates a lack of readily exploitable entry points like AJAX handlers, REST API routes, or shortcodes, this is overshadowed by the fact that 100% of its outputs are unescaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed in users' browsers if any user-supplied data is reflected in the plugin's output.
Furthermore, the presence of the `create_function` function is a red flag. This function is deprecated in modern PHP and is often associated with security risks due to its dynamic code execution capabilities. While no taint flows or SQL injection vulnerabilities were identified, and the plugin has no recorded vulnerability history, these positive aspects do not negate the critical risk posed by the widespread lack of output escaping and the use of `create_function`. The absence of any capability or nonce checks on the identified entry points (though there are none listed) also means that if any entry points were to be added in the future, they would likely be unprotected.
In conclusion, despite a clean vulnerability history and no apparent SQL injection or taint vulnerabilities, the plugin's fundamental implementation issues, specifically unescaped output and the use of `create_function`, make it a significant security risk. The lack of output escaping is a critical flaw that could lead to XSS attacks. The plugin should be updated or patched to address these fundamental security weaknesses.
Key Concerns
- All outputs are unescaped
- Uses deprecated and dangerous function 'create_function'
- No nonce checks on entry points
- No capability checks on entry points
Google+ Follow Box Security Vulnerabilities
Google+ Follow Box Release Timeline
Google+ Follow Box Code Analysis
Dangerous Functions Found
Output Escaping
Google+ Follow Box Attack Surface
WordPress Hooks 1
Maintenance & Trust
Google+ Follow Box Maintenance & Trust
Maintenance Signals
Community Trust
Google+ Follow Box Alternatives
Add to Circle Widget
add-to-circle-widget
This plugin generates a widget to add Google+ badge on your blog with 'Add to Circles' button.
Google Plus Badge Direct Connect
google-badge-connect-direct-for-wordpress
Google+ badge allows visitors to directly connect with and promote your brand on Google+ from your website. Now you can add a Google+ badge to help yo …
Google+ Page Badge
google-page-badge
Show one or multiple Google+ badges for your G+ page in a widget, using a shortcode, or with template tags.
Google+ Follow Box Developer Profile
2 plugins · 390 total installs
How We Detect Google+ Follow Box
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/google-plus-badge-like-fb-like-box/google_plus_like_fb_like_box.phphttps://apis.google.com/js/plusone.jsHTML / DOM Fingerprints
google_plus_follow_boxdata-action="followers"data-heightdata-href="https://plus.google.com/"data-source="blogger:blog:followers"data-widthdata-size="standard"+1 morepos