GP Download Name Security & Risk Analysis

wordpress.org/plugins/gp-download-name

A plugin for GlotPress that uses a customizable template for the download file name.

20 active installs v0.6 PHP + WP 4.4+ Updated Dec 3, 2023
glotpresstranslation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GP Download Name Safe to Use in 2026?

Generally Safe

Score 85/100

GP Download Name has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'gp-download-name' plugin v0.6 exhibits a generally strong security posture based on the provided static analysis. The absence of identified dangerous functions, SQL injection vulnerabilities due to prepared statements, and file operation risks are commendable. Taint analysis also revealed no critical or high severity flows, suggesting the plugin is likely not susceptible to common injection attacks. The limited attack surface and the presence of at least one capability check are positive indicators.

However, a significant concern arises from the 50% of output operations that are not properly escaped. This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is incorporated into these unescaped outputs. The complete lack of nonce checks, while not immediately detrimental given the zero entry points, could become a weakness if new entry points are added in future versions without corresponding security measures. The plugin's vulnerability history is currently clean, which is a positive sign, but this doesn't negate the identified code-level risks.

In conclusion, while the plugin has a clean history and good practices in critical areas like SQL and file handling, the unescaped output represents a tangible risk that needs immediate attention. The lack of nonce checks, though minor now, should be monitored for future development. The overall security is decent but has a specific, exploitable weakness.

Key Concerns

  • Half of output operations are not properly escaped
  • No nonce checks present
Vulnerabilities
None known

GP Download Name Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GP Download Name Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
admin_page (gp-download-name.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GP Download Name Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actiongp_export_translations_filenamegp-download-name.php:23
actionadmin_menugp-download-name.php:27
actiongp_initgp-download-name.php:153
Maintenance & Trust

GP Download Name Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 3, 2023
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

GP Download Name Developer Profile

Greg Ross

34 plugins · 8K total installs

80
trust score
Avg Security Score
88/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect GP Download Name

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapnoticenotice-successis-dismissiblenotice-error
Data Attributes
id="gp-download-name"name="gp-download-name"
FAQ

Frequently Asked Questions about GP Download Name