GoZen Engage Security & Risk Analysis

wordpress.org/plugins/gozen-engage

GoZen Engage is a AI-Powered Interactive Content And Gamification

20 active installs v1.0.3 PHP 7.2+ WP 4.6.1+ Updated Unknown
calculatorsform-buildergamificationonline-formsonline-survey
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GoZen Engage Safe to Use in 2026?

Generally Safe

Score 100/100

GoZen Engage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "gozen-engage" plugin v1.0.3 exhibits a strong security posture based on the provided static analysis results. The absence of any identified dangerous functions, unsanitized taint flows, and the proper use of prepared statements for all SQL queries are commendable practices. Furthermore, the plugin demonstrates robust output escaping, ensuring that data displayed to users is not vulnerable to cross-site scripting attacks. The lack of file operations and external HTTP requests also limits potential attack vectors. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a history of secure development or diligent patching by the developers.

However, a significant concern arises from the complete lack of nonces and capability checks. While the static analysis shows zero entry points without authentication, this does not negate the importance of these security measures. Without nonces, actions that modify data or perform sensitive operations are vulnerable to Cross-Site Request Forgery (CSRF) attacks, even if they are properly authenticated. Similarly, the absence of capability checks means that even authenticated users might be able to perform actions they are not authorized to, potentially leading to privilege escalation. Therefore, while the code itself is clean regarding common vulnerabilities like SQL injection and XSS, the missing CSRF and authorization protections represent a critical oversight that could be exploited.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

GoZen Engage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GoZen Engage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

100% escaped12 total outputs
Attack Surface

GoZen Engage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitcontroller\api\index.php:34
actionwp_footercontroller\api\index.php:37
actionadmin_menucontroller\api\index.php:44
Maintenance & Trust

GoZen Engage Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.2
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs20
Developer Profile

GoZen Engage Developer Profile

optinlyhq

3 plugins · 930 total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
379 days
View full developer profile
Detection Fingerprints

How We Detect GoZen Engage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gozen-engage/css/gzeng.css/wp-content/plugins/gozen-engage/javascript/gzengScript.js/wp-content/plugins/gozen-engage/javascript/gzengWorkspace.js/wp-content/plugins/gozen-engage/javascript/gzengTemplate.js
Script Paths
javascript/gzengScript.jsjavascript/gzengWorkspace.jsjavascript/gzengTemplate.js
Version Parameters
gzeng-style?ver=gzeng-script?ver=gzeng-workspace?ver=gzeng-template?ver=

HTML / DOM Fingerprints

JS Globals
gzeng_url
FAQ

Frequently Asked Questions about GoZen Engage