Gplus Publisher Security & Risk Analysis

wordpress.org/plugins/gplus-publisher

Puts rel="publisher" code related to Google+ in the without-autor-pages of your blog.

10 active installs v0.99 PHP + WP 2.8+ Updated Feb 8, 2012
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gplus Publisher Safe to Use in 2026?

Generally Safe

Score 85/100

Gplus Publisher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The gplus-publisher plugin version 0.99 exhibits a generally weak security posture despite the absence of known vulnerabilities and a clean taint analysis. While the static analysis reports no detected entry points like AJAX handlers, REST API routes, shortcodes, or cron events, and no dangerous functions or raw SQL queries are present, there are significant concerns regarding output escaping. A concerning 0% of the identified outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities if any of these outputs are ever exposed to user-supplied data. The lack of nonce checks and capability checks on any potential (though not identified) entry points further compounds this risk. The plugin's vulnerability history is clean, which is positive, but it doesn't mitigate the immediate risks identified in the static analysis. In conclusion, while the plugin has a seemingly small attack surface and no history of exploits, the critical flaw in output escaping presents a substantial and immediate security risk that could lead to widespread compromise.

Key Concerns

  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Gplus Publisher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Gplus Publisher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Gplus Publisher Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuadmin.php:5
actionadmin_initadmin.php:47
actionwp_headgplus-publisher.php:18
Maintenance & Trust

Gplus Publisher Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedFeb 8, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

Gplus Publisher Alternatives

No alternatives data available yet.

Developer Profile

Gplus Publisher Developer Profile

Francisco Torres

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gplus Publisher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Gplus Publisher -->
Data Attributes
rel="publisher"
FAQ

Frequently Asked Questions about Gplus Publisher