Gp post Like Security & Risk Analysis

wordpress.org/plugins/gp-post-like

Allow user add post like button above or below post content.

10 active installs v1.0 PHP + WP 3.2+ Updated Feb 6, 2018
likepost-likepost-votingvoting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Gp post Like Safe to Use in 2026?

Generally Safe

Score 85/100

Gp post Like has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "gp-post-like" plugin version 1.0 exhibits a generally good security posture based on the provided static analysis. The absence of SQL injection vulnerabilities due to the exclusive use of prepared statements and the lack of critical or high-severity taint flows are significant strengths. Additionally, the plugin has no recorded CVEs, suggesting a history of stability. However, a notable concern is the complete lack of output escaping for all six identified output points. This means that any data rendered to the user interface originating from user input or other potentially untrusted sources could be vulnerable to Cross-Site Scripting (XSS) attacks, allowing an attacker to inject malicious scripts into the user's browser.

While the plugin has a clean vulnerability history, the identified weakness in output sanitization represents a tangible risk. The presence of 2 AJAX handlers and 1 shortcode, while currently protected by checks (as indicated by 0 unprotected entry points), means that any future changes that introduce vulnerabilities in these areas could be exploited. The absence of capability checks on entry points is a minor concern; while not directly exploited by the current analysis, it could weaken the overall access control strategy if these entry points were to process sensitive data in the future.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Gp post Like Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Gp post Like Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
gppl_post_like (index.php:116)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Gp post Like Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 2

noprivwp_ajax_gppl_post_likeindex.php:112
authwp_ajax_gppl_post_likeindex.php:113

Shortcodes 1

[gppostlike] index.php:206
WordPress Hooks 5
actionplugins_loadedindex.php:11
actionadmin_menuindex.php:36
actionadmin_initindex.php:46
actionwp_headindex.php:60
filterthe_contentindex.php:231
Maintenance & Trust

Gp post Like Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 6, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Gp post Like Developer Profile

Ganesh Paygude

6 plugins · 120 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gp post Like

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gp-post-like/css/gppl-style.css/wp-content/plugins/gp-post-like/js/gppl-script.js
Script Paths
/wp-content/plugins/gp-post-like/js/gppl-script.js
Version Parameters
gp-post-like/css/gppl-style.css?ver=1.0

HTML / DOM Fingerprints

CSS Classes
post-likelikealreadyvotedqtip
Data Attributes
data-post_id
JS Globals
ajaxurlnonce
Shortcode Output
[gppostlike
FAQ

Frequently Asked Questions about Gp post Like