Google Plus One Bottom Security & Risk Analysis

wordpress.org/plugins/google-plus-one-bottom

Promotion your pr in google +1 with the google plus one bottom plugin. With google plus one bottom, your users can promote your content by sharing goo …

20 active installs v0.0.2 PHP + WP 2.8+ Updated Jul 2, 2011
1-buttongooglegoogle-1google-1-buttongoogle-plus-one-button
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google Plus One Bottom Safe to Use in 2026?

Generally Safe

Score 85/100

Google Plus One Bottom has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "google-plus-one-bottom" plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, utilizing prepared statements exclusively, and has no recorded vulnerability history, suggesting a low likelihood of known exploitable issues. The absence of file operations and external HTTP requests also reduces certain attack vectors. However, the static analysis reveals significant concerns, most notably the presence of three "unserialize" functions, which are inherently dangerous if used with untrusted input, and a complete lack of output escaping across all nine identified output points. The absence of nonce and capability checks on any identified entry points, though the attack surface is currently zero, means that if any entry points were to be introduced or discovered, they would be unprotected. The vulnerability history shows no past issues, which is a positive sign, but does not mitigate the inherent risks identified in the code itself.

While the plugin currently presents a zero attack surface, the presence of dangerous functions like `unserialize` and the complete lack of output escaping are critical weaknesses. If any of these functions were ever to process user-supplied data, it could lead to serious vulnerabilities such as Remote Code Execution (RCE) or Cross-Site Scripting (XSS). The lack of checks on potential future entry points also represents a latent risk. The absence of a vulnerability history is a good indicator, but it doesn't negate the need to address the identified coding flaws. The overall security is questionable due to these critical coding practices.

Key Concerns

  • Dangerous function: unserialize
  • Output escaping: 0% properly escaped
  • Nonce checks: 0
  • Capability checks: 0
Vulnerabilities
None known

Google Plus One Bottom Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Google Plus One Bottom Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$options = unserialize(get_option("plusone"));googlePlusOne.php:32
unserialize$options = unserialize(get_option("plusone"));googlePlusOne.php:95
unserialize$options = unserialize(get_option("plusone"));googlePlusOne.php:117

Output Escaping

0% escaped9 total outputs
Attack Surface

Google Plus One Bottom Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menugooglePlusOne.php:25
filterthe_contentgooglePlusOne.php:112
actionwp_headgooglePlusOne.php:125
Maintenance & Trust

Google Plus One Bottom Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJul 2, 2011
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Google Plus One Bottom Developer Profile

ddd2500

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Google Plus One Bottom

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://apis.google.com/js/plusone.js

HTML / DOM Fingerprints

HTML Comments
<!-- If u want to theme it yourself, plz put this code where you want -->
Data Attributes
g:plusone
JS Globals
gapi
Shortcode Output
<g:plusone
FAQ

Frequently Asked Questions about Google Plus One Bottom