GP Auto Extract Security & Risk Analysis

wordpress.org/plugins/gp-auto-extract

A plugin for GlotPress that adds an option to extract original strings from a remote source repo directly in to a GlotPress project.

10 active installs v1.1 PHP + WP 4.4+ Updated Nov 7, 2024
glotpresstranslation
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GP Auto Extract Safe to Use in 2026?

Generally Safe

Score 92/100

GP Auto Extract has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The gp-auto-extract plugin v1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, especially without authentication checks, significantly limits the potential attack surface. The plugin also demonstrates good practices in SQL query handling, with 100% of queries using prepared statements, and a high percentage (87%) of output being properly escaped, which mitigates common cross-site scripting (XSS) risks. The lack of external HTTP requests further reduces its exposure to remote code execution or data leakage vulnerabilities.

Despite these strengths, the presence of 8 'dangerous functions' is a notable concern. While the analysis doesn't specify the context of these functions (e.g., if they are used in a secure, controlled manner), their mere presence warrants careful review to ensure they are not exploitable. The taint analysis showing zero flows is positive, but this could also be due to the limited attack surface preventing such flows from being constructed. The vulnerability history is exceptionally clean, with no recorded CVEs, which suggests a history of secure development or at least a lack of publicly disclosed vulnerabilities. However, this absence of past issues does not guarantee future security, and the identified dangerous functions remain a point of potential risk.

In conclusion, the gp-auto-extract plugin v1.1 appears to be developed with security in mind, particularly regarding common web vulnerabilities like SQL injection and XSS, and it has a clean vulnerability track record. The primary area of caution lies in the use of 'dangerous functions,' which requires further investigation to ascertain their implementation and potential for abuse. The overall risk is assessed as low, but the presence of these functions prevents it from being negligible.

Key Concerns

  • Presence of dangerous functions
Vulnerabilities
None known

GP Auto Extract Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GP Auto Extract Code Analysis

Dangerous Functions
8
Raw SQL Queries
0
0 prepared
Unescaped Output
10
69 escaped
Nonce Checks
1
Capability Checks
1
File Operations
41
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

systemsystem( "msguniq --use-first $output_shell -o $output_shell" );include\extract\makepot.php:241
systemsystem( "msguniq $output_shell -o $output_shell" );include\extract\makepot.php:305
systemsystem( "msgcat --more-than=1 --use-first $frontend_pot $admin_pot > $common_pot" );include\extract\makepot.php:312
systemsystem( "msgcat -u --use-first $admin_pot $common_pot -o $admin_pot" );include\extract\makepot.php:313
systemsystem( "msgcat --more-than=1 --use-first $frontend_pot $admin_pot $net_admin_pot > $common_pot" );include\extract\makepot.php:350
systemsystem( "msgcat -u --use-first $net_admin_pot $common_pot -o $net_admin_pot" );include\extract\makepot.php:351
systemsystem("msguniq $output_shell -o $output_shell");include\extract\makepot.php:510
systemsystem("msguniq $output_shell -o $output_shell");include\extract\makepot.php:565

Output Escaping

87% escaped79 total outputs
Attack Surface

GP Auto Extract Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menugp-auto-extract.php:105
actionadmin_enqueue_scriptsgp-auto-extract.php:106
actiongp_project_actionsgp-auto-extract.php:110
filterhttp_request_argsgp-auto-extract.php:313
actiongp_initgp-auto-extract.php:782
Maintenance & Trust

GP Auto Extract Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedNov 7, 2024
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GP Auto Extract Developer Profile

Greg Ross

34 plugins · 8K total installs

80
trust score
Avg Security Score
88/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect GP Auto Extract

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gp-auto-extract/css/gp-auto-extract.css/wp-content/plugins/gp-auto-extract/js/gp-auto-extract.js
Script Paths
/wp-content/plugins/gp-auto-extract/js/gp-auto-extract.js
Version Parameters
gp-auto-extract/css/gp-auto-extract.css?ver=gp-auto-extract/js/gp-auto-extract.js?ver=

HTML / DOM Fingerprints

JS Globals
gpae
REST Endpoints
/auto-extract/(.+?)
Shortcode Output
gp_link_get( gp_url( 'auto-extract/__('Auto Extract')
FAQ

Frequently Asked Questions about GP Auto Extract