Google+ Page Badge Security & Risk Analysis

wordpress.org/plugins/google-plus-page-badge

Lets you insert a Google+ Page Badge to your site via shortcode. Easy to intall and implement.

10 active installs v0.1 PHP + WP 2.7+ Updated Jan 26, 2012
googlegoogle-pagesgoogle-plusgoogle-plus-pages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google+ Page Badge Safe to Use in 2026?

Generally Safe

Score 85/100

Google+ Page Badge has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "google-plus-page-badge" plugin, in its v0.1 version, exhibits a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no direct SQL queries (all prepared statements), no file operations, and no external HTTP requests, which significantly reduces common attack vectors. The plugin also has a minimal attack surface with only one shortcode and no identified cron events or REST API routes. Furthermore, there is no recorded vulnerability history, which is a strong indicator of good development practices to date.

However, a critical concern arises from the complete lack of output escaping. With 100% of the identified outputs being unescaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by the plugin, if not properly sanitized by the application or user input, could be injected with malicious scripts. Additionally, the absence of nonce checks and capability checks, even for the single shortcode, leaves the plugin vulnerable to unauthorized actions or privilege escalation if an attacker can trick a logged-in user into triggering the shortcode with malicious intent.

In conclusion, while the plugin benefits from a small attack surface and a clean history, the critical flaw in output escaping and the lack of essential security checks like nonces and capability checks present a significant risk. These vulnerabilities, if exploited, could lead to severe security breaches for WordPress sites using this plugin.

Key Concerns

  • No output escaping detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Google+ Page Badge Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Google+ Page Badge Release Timeline

v0.1Current
Code Analysis
Analyzed Apr 16, 2026

Google+ Page Badge Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Google+ Page Badge Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gpbadge] google-plus-page-badge.php:210
WordPress Hooks 3
actionadmin_menugoogle-plus-page-badge.php:24
actionwp_headgoogle-plus-page-badge.php:191
filterwidget_textgoogle-plus-page-badge.php:209
Maintenance & Trust

Google+ Page Badge Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 26, 2012
PHP min version
Downloads8K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Google+ Page Badge Developer Profile

Alex Moss

13 plugins · 4K total installs

67
trust score
Avg Security Score
83/100
Avg Patch Time
249 days
View full developer profile
Detection Fingerprints

How We Detect Google+ Page Badge

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/google-plus-page-badge/style.css
Script Paths
https://apis.google.com/js/plusone.js

HTML / DOM Fingerprints

CSS Classes
g-plus
Data Attributes
data-hrefdata-size
JS Globals
window.__gcfg
Shortcode Output
<div class="g-plus" data-href="https://plus.google.com/105796846489429422695" data-size="badge"></div>
FAQ

Frequently Asked Questions about Google+ Page Badge