GP Random Post Widget Security & Risk Analysis

wordpress.org/plugins/gp-random-post-widget

Create Random Post Widget in your theme Wordpres.

10 active installs v1.0 PHP + WP 1.0+ Updated Nov 2, 2015
bai-viet-ngau-nhien-widgetcreate-random-post-widgetrandom-post-widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GP Random Post Widget Safe to Use in 2026?

Generally Safe

Score 85/100

GP Random Post Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "gp-random-post-widget" plugin version 1.0 exhibits a generally positive security posture based on the provided static analysis. The absence of identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and external HTTP requests are strong indicators of secure coding practices. Furthermore, the lack of any recorded vulnerabilities in its history suggests a stable and well-maintained codebase. The plugin also boasts a remarkably small attack surface with no identified entry points needing authentication, which is an advantage in reducing potential exploitation vectors.

However, a significant concern arises from the low percentage of properly escaped output (29%). This indicates that data rendered by the plugin might be susceptible to Cross-Site Scripting (XSS) attacks, especially if user-controlled input or dynamic content is involved in these unescaped outputs. The lack of nonce checks and capability checks, while not directly indicating a vulnerability given the zero attack surface, means that if any entry points were to be introduced in future versions without proper authentication, these security layers would be missing, creating an immediate risk. The absence of taint analysis flows is a neutral observation; it doesn't necessarily mean there are no potential issues, but rather that the analysis either didn't detect any or wasn't performed comprehensively enough to reveal them. In conclusion, while the plugin has a solid foundation, the unescaped output is a notable weakness that requires attention to prevent potential XSS vulnerabilities.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

GP Random Post Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

GP Random Post Widget Release Timeline

vv.1.0
Code Analysis
Analyzed Apr 16, 2026

GP Random Post Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

GP Random Post Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initgp-random-post-widget.php:68
Maintenance & Trust

GP Random Post Widget Maintenance & Trust

Maintenance Signals

WordPress version tested1.0
Last updatedNov 2, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GP Random Post Widget Developer Profile

giangmd93

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GP Random Post Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gp-random-post-widget/gp-random-post-widget.php

HTML / DOM Fingerprints

CSS Classes
gp_random_post_list
FAQ

Frequently Asked Questions about GP Random Post Widget