Google Reader Blogroll Widget Security & Risk Analysis

wordpress.org/plugins/google-reader-blogroll-widget

Simple widget(s) to list your Google Reader subscriptions as blogroll.

10 active installs v0.1.0 PHP + WP 2.0.2+ Updated Unknown
blogrollgoogle-readerwidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Google Reader Blogroll Widget Safe to Use in 2026?

Generally Safe

Score 100/100

Google Reader Blogroll Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The google-reader-blogroll-widget plugin, version 0.1.0, exhibits a strong security posture in several key areas. The static analysis reveals a complete absence of identifiable entry points such as AJAX handlers, REST API routes, shortcodes, and cron events. Furthermore, the code signals indicate no dangerous functions are used, all SQL queries are prepared, and there are no file operations or external HTTP requests. This suggests a well-contained and potentially low-risk plugin.

However, a significant concern arises from the complete lack of output escaping. With 5 total outputs analyzed and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the widget could be manipulated by attackers to inject malicious scripts, impacting users of the affected WordPress site. The absence of nonce checks and capability checks, while not immediately exploitable due to the limited attack surface, could become a vector if new entry points are introduced in future versions without proper security measures.

The plugin's vulnerability history is clean, with no known CVEs. This, combined with the limited attack surface and the plugin's apparent focus, suggests a developer who may have been cautious. Nevertheless, the unescaped output is a critical flaw that needs immediate attention. The plugin's strengths lie in its limited attack surface and secure data handling for SQL, but its weakness in output sanitization creates a notable risk.

Key Concerns

  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Google Reader Blogroll Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Google Reader Blogroll Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Google Reader Blogroll Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headgreader-blogroll.php:45
actionwidgets_initgreader-blogroll.php:253
Maintenance & Trust

Google Reader Blogroll Widget Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Google Reader Blogroll Widget Developer Profile

marcu5

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Google Reader Blogroll Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/google-reader-blogroll-widget/publisher-en.js
Script Paths
https://www.google.com/reader/ui/publisher-en.js

HTML / DOM Fingerprints

CSS Classes
widget_greader_blogroll
Data Attributes
id="greaderblogroll-pubpagelink"
JS Globals
GRC_p
FAQ

Frequently Asked Questions about Google Reader Blogroll Widget