
Gplus Publisher Security & Risk Analysis
wordpress.org/plugins/gplus-publisherPuts rel="publisher" code related to Google+ in the without-autor-pages of your blog.
Is Gplus Publisher Safe to Use in 2026?
Generally Safe
Score 85/100Gplus Publisher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The gplus-publisher plugin version 0.99 exhibits a generally weak security posture despite the absence of known vulnerabilities and a clean taint analysis. While the static analysis reports no detected entry points like AJAX handlers, REST API routes, shortcodes, or cron events, and no dangerous functions or raw SQL queries are present, there are significant concerns regarding output escaping. A concerning 0% of the identified outputs are properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities if any of these outputs are ever exposed to user-supplied data. The lack of nonce checks and capability checks on any potential (though not identified) entry points further compounds this risk. The plugin's vulnerability history is clean, which is positive, but it doesn't mitigate the immediate risks identified in the static analysis. In conclusion, while the plugin has a seemingly small attack surface and no history of exploits, the critical flaw in output escaping presents a substantial and immediate security risk that could lead to widespread compromise.
Key Concerns
- No output escaping
- No nonce checks
- No capability checks
Gplus Publisher Security Vulnerabilities
Gplus Publisher Code Analysis
Output Escaping
Gplus Publisher Attack Surface
WordPress Hooks 3
Maintenance & Trust
Gplus Publisher Maintenance & Trust
Maintenance Signals
Community Trust
Gplus Publisher Alternatives
No alternatives data available yet.
Gplus Publisher Developer Profile
2 plugins · 60 total installs
How We Detect Gplus Publisher
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<!-- Gplus Publisher -->rel="publisher"