
GP Auto Extract Security & Risk Analysis
wordpress.org/plugins/gp-auto-extractA plugin for GlotPress that adds an option to extract original strings from a remote source repo directly in to a GlotPress project.
Is GP Auto Extract Safe to Use in 2026?
Generally Safe
Score 92/100GP Auto Extract has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The gp-auto-extract plugin v1.1 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events, especially without authentication checks, significantly limits the potential attack surface. The plugin also demonstrates good practices in SQL query handling, with 100% of queries using prepared statements, and a high percentage (87%) of output being properly escaped, which mitigates common cross-site scripting (XSS) risks. The lack of external HTTP requests further reduces its exposure to remote code execution or data leakage vulnerabilities.
Despite these strengths, the presence of 8 'dangerous functions' is a notable concern. While the analysis doesn't specify the context of these functions (e.g., if they are used in a secure, controlled manner), their mere presence warrants careful review to ensure they are not exploitable. The taint analysis showing zero flows is positive, but this could also be due to the limited attack surface preventing such flows from being constructed. The vulnerability history is exceptionally clean, with no recorded CVEs, which suggests a history of secure development or at least a lack of publicly disclosed vulnerabilities. However, this absence of past issues does not guarantee future security, and the identified dangerous functions remain a point of potential risk.
In conclusion, the gp-auto-extract plugin v1.1 appears to be developed with security in mind, particularly regarding common web vulnerabilities like SQL injection and XSS, and it has a clean vulnerability track record. The primary area of caution lies in the use of 'dangerous functions,' which requires further investigation to ascertain their implementation and potential for abuse. The overall risk is assessed as low, but the presence of these functions prevents it from being negligible.
Key Concerns
- Presence of dangerous functions
GP Auto Extract Security Vulnerabilities
GP Auto Extract Code Analysis
Dangerous Functions Found
Output Escaping
GP Auto Extract Attack Surface
WordPress Hooks 5
Maintenance & Trust
GP Auto Extract Maintenance & Trust
Maintenance Signals
Community Trust
GP Auto Extract Alternatives
Localize WordPress
localize
Easily switch to any localization from GlotPress
WP Translation Status
wp-translation
Make a link to GlotPress centralised translation so contributor can help translating the plugin that do not have yet a translation in the local site l …
GP Remove Powered By
gp-removed-powered-by
A plugin for GlotPress as a WordPress plugin that removes the "Powered By" in the footer.
GP Additional Links
gp-additional-links
A plugin for GlotPress as a WordPress plugin that adds a link to the WordPress dashboard for admins in the GlotPress page as well as a link to the Glo …
GP Download Name
gp-download-name
A plugin for GlotPress that uses a customizable template for the download file name.
GP Auto Extract Developer Profile
34 plugins · 8K total installs
How We Detect GP Auto Extract
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/gp-auto-extract/css/gp-auto-extract.css/wp-content/plugins/gp-auto-extract/js/gp-auto-extract.js/wp-content/plugins/gp-auto-extract/js/gp-auto-extract.jsgp-auto-extract/css/gp-auto-extract.css?ver=gp-auto-extract/js/gp-auto-extract.js?ver=HTML / DOM Fingerprints
gpae/auto-extract/(.+?)gp_link_get( gp_url( 'auto-extract/__('Auto Extract')