GPSies Embed Security & Risk Analysis

wordpress.org/plugins/gpsiesembed

Add GPSies Maps to your posts and pages.(Only for WordPress 2.5+)

10 active installs v0.2 PHP + WP 2.5+ Updated Jan 31, 2011
gisgoogle-mapspostsroutetracks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GPSies Embed Safe to Use in 2026?

Generally Safe

Score 85/100

GPSies Embed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The gpsiesembed plugin v0.2 exhibits a mixed security posture. On one hand, it demonstrates good practices by having a minimal attack surface, no known vulnerabilities in its history, and utilizing prepared statements for all SQL queries. This suggests a developer who is aware of common WordPress security pitfalls. However, the static analysis reveals significant concerns, particularly regarding output escaping and taint analysis. A very low percentage of output is properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the presence of unsanitized paths in taint flows, even if not reaching a critical severity in this analysis, indicates a potential for path traversal or other file system related vulnerabilities. The absence of nonce checks and capability checks for potential entry points, though currently zero, is a critical oversight that could lead to severe issues if the plugin were to gain new functionalities in the future.

The plugin's vulnerability history is currently clean, which is a positive sign. This, combined with the use of prepared statements, suggests the developer may be taking security seriously. However, the lack of historical data also means we cannot definitively conclude long-term security habits. The current analysis, despite a clean history, points to significant areas of weakness in output sanitization and input validation, which are fundamental to secure plugin development. While the plugin currently presents a low immediate risk due to its limited attack surface and clean history, the identified weaknesses in output escaping and taint flows represent a substantial latent risk.

Key Concerns

  • Low output escaping percentage
  • Unsanitized paths in taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

GPSies Embed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

GPSies Embed Release Timeline

v0.2Current
v0.1.6
v0.1.4
v0.1.3
v0.1.2
v0.1.1
v0.1.0
Code Analysis
Analyzed Mar 17, 2026

GPSies Embed Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

4% escaped23 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
show_config (plugin.php:557)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GPSies Embed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterthe_contentgpsiesEmbed.php:58
actionwp_headgpsiesEmbed.php:59
actioninitplugin.php:121
actionplugins_loadedplugin.php:481
actionsidebar_admin_setupplugin.php:507
actionsidebar_admin_pageplugin.php:508
Maintenance & Trust

GPSies Embed Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJan 31, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GPSies Embed Developer Profile

flavio78vi

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GPSies Embed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[gpsies url width height]
FAQ

Frequently Asked Questions about GPSies Embed