Google plus stream Widget Security & Risk Analysis

wordpress.org/plugins/google-plus-stream-for-wordpress

This plugin creates a widget which displays Google+ stream in your sidebar.

10 active installs v1.1 PHP + WP 3.0+ Updated Sep 10, 2011
googlegoogle-plusgoogle-plus-streamgoogle-plus-widgetgoogle-widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google plus stream Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Google plus stream Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The static analysis of google-plus-stream-for-wordpress v1.1 reveals a plugin with a seemingly minimal attack surface and a strong adherence to secure coding practices regarding SQL queries. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, particularly those unprotected by authentication, is a positive indicator. Furthermore, the fact that all identified SQL queries utilize prepared statements significantly mitigates the risk of SQL injection vulnerabilities.

However, there are notable areas of concern. The very low percentage of properly escaped output (6%) is a significant red flag. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, where malicious code could be injected into the website's output, impacting users. The lack of nonce checks and capability checks across the plugin's entry points, coupled with the file operation and external HTTP request, presents potential avenues for unauthorized actions or data leakage if these operations are not handled with extreme care and proper validation.

The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests a good track record, but it's important to remember that a lack of past vulnerabilities doesn't guarantee future security. The current analysis highlights specific weaknesses in output escaping and authorization checks that, if exploited, could lead to severe security incidents, regardless of past history.

Key Concerns

  • Low output escaping rate
  • No nonce checks
  • No capability checks
  • File operation detected
  • External HTTP request detected
Vulnerabilities
None known

Google plus stream Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Google plus stream Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

6% escaped16 total outputs
Attack Surface

Google plus stream Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headgoogle-plus-stream.php:70
actionadmin_menugoogle-plus-stream.php:321
Maintenance & Trust

Google plus stream Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 10, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Google plus stream Widget Developer Profile

sudipto

3 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Google plus stream Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
gps-contgps-profilegps-dnamegps-profimggps-credit
Data Attributes
id="gps-cont"id="gps-profile"id="gps-dname"id="gps-profimg"id="gps-credit"
FAQ

Frequently Asked Questions about Google plus stream Widget