
Google Plus One Bottom Security & Risk Analysis
wordpress.org/plugins/google-plus-one-bottomPromotion your pr in google +1 with the google plus one bottom plugin. With google plus one bottom, your users can promote your content by sharing goo …
Is Google Plus One Bottom Safe to Use in 2026?
Generally Safe
Score 85/100Google Plus One Bottom has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "google-plus-one-bottom" plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, utilizing prepared statements exclusively, and has no recorded vulnerability history, suggesting a low likelihood of known exploitable issues. The absence of file operations and external HTTP requests also reduces certain attack vectors. However, the static analysis reveals significant concerns, most notably the presence of three "unserialize" functions, which are inherently dangerous if used with untrusted input, and a complete lack of output escaping across all nine identified output points. The absence of nonce and capability checks on any identified entry points, though the attack surface is currently zero, means that if any entry points were to be introduced or discovered, they would be unprotected. The vulnerability history shows no past issues, which is a positive sign, but does not mitigate the inherent risks identified in the code itself.
While the plugin currently presents a zero attack surface, the presence of dangerous functions like `unserialize` and the complete lack of output escaping are critical weaknesses. If any of these functions were ever to process user-supplied data, it could lead to serious vulnerabilities such as Remote Code Execution (RCE) or Cross-Site Scripting (XSS). The lack of checks on potential future entry points also represents a latent risk. The absence of a vulnerability history is a good indicator, but it doesn't negate the need to address the identified coding flaws. The overall security is questionable due to these critical coding practices.
Key Concerns
- Dangerous function: unserialize
- Output escaping: 0% properly escaped
- Nonce checks: 0
- Capability checks: 0
Google Plus One Bottom Security Vulnerabilities
Google Plus One Bottom Code Analysis
Dangerous Functions Found
Output Escaping
Google Plus One Bottom Attack Surface
WordPress Hooks 3
Maintenance & Trust
Google Plus One Bottom Maintenance & Trust
Maintenance Signals
Community Trust
Google Plus One Bottom Alternatives
Google Plusone(+1) Button
googleplusone-button
Author Site|
Sharekoube
sharekoube
Add to Sharedaddy support service.
Add Google PlusOne
add-google-plusone
It features template tag (both fully customizable on top or bottom of content) allowing you to place as many Google +1 buttons on your site as you wan …
All In One Social Network Buttons
all-in-one-social-network-buttons
You can have all social network buttons or box counters from Facebook, Google Buzz, Google+ (Google +1), Twitter, StumbleUpon, Digg, MySpace, Deliciou …
Like to Unlock lite
jcwp-like-to-unlock-lite
This plugin gives you control to initially hide part of your article from user. Content is displayed correctly once user Facebook Like or +1 your page
Google Plus One Bottom Developer Profile
1 plugin · 20 total installs
How We Detect Google Plus One Bottom
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
http://apis.google.com/js/plusone.jsHTML / DOM Fingerprints
<!-- If u want to theme it yourself, plz put this code where you want -->g:plusonegapi<g:plusone