GPX Viewer Security & Risk Analysis

wordpress.org/plugins/gpx-viewer

Display GPX tracks with their elevation profile on OSM maps, edit them interactively

800 active installs v2.2.15 PHP 7.2.24+ WP 4.9+ Updated Jul 14, 2025
elevationgpxmapopenstreetmaptrack
98
A · Safe
CVEs total2
Unpatched0
Last CVEFeb 21, 2025
Download
Safety Verdict

Is GPX Viewer Safe to Use in 2026?

Generally Safe

Score 98/100

GPX Viewer has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Feb 21, 2025Updated 8mo ago
Risk Assessment

The gpx-viewer plugin v2.2.16 exhibits a mixed security posture. On the positive side, the static analysis reveals a relatively small attack surface with no identified unprotected entry points, a good percentage of properly escaped output, and robust use of nonce and capability checks. The absence of dangerous functions and external HTTP requests are also strengths. However, the analysis highlights significant concerns related to database interactions and path handling. The sole SQL query is not using prepared statements, posing a potential SQL injection risk. Furthermore, the taint analysis indicates four flows with unsanitized paths, suggesting a risk of path traversal vulnerabilities, even though no critical or high-severity taint flows were explicitly flagged in the static analysis. The plugin's vulnerability history is a major concern, with two known CVEs, including one high-severity vulnerability, and a recent discovery date. This history, particularly the recurring themes of path traversal and missing authorization, suggests a pattern of insecure coding practices that have previously led to exploitable vulnerabilities. While the current version appears to have addressed past CVEs, the underlying patterns in the code and past vulnerabilities warrant careful consideration.

Key Concerns

  • SQL query not using prepared statements
  • Flows with unsanitized paths found
  • 1 High severity CVE historically
  • 2 Total known CVEs historically
  • File operation without apparent sanitization
Vulnerabilities
2

GPX Viewer Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1
Low
1

2 total CVEs

CVE-2025-27274low · 2.7Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

GPX Viewer <= 2.2.11 - Authenticated (Editor+) Path Traversal

Feb 21, 2025 Patched in 2.2.12 (18d)
CVE-2024-10629high · 8.8Missing Authorization

GPX Viewer <= 2.2.9 - Authenticated (Subscriber+) Arbitrary File Creation

Nov 12, 2024 Patched in 2.2.10 (3d)
Code Analysis
Analyzed Mar 16, 2026

GPX Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
15
185 escaped
Nonce Checks
3
Capability Checks
3
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

93% escaped200 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

6 flows4 with unsanitized paths
gpxv_upload_page (gpx-viewer-admin.php:253)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

GPX Viewer Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 1

authwp_ajax_gpxv_file_uploadgpx-viewer.php:207

Shortcodes 1

[gpx-view] gpx-viewer-main.php:14
WordPress Hooks 7
actionadmin_initgpx-viewer-admin.php:16
actionadmin_menugpx-viewer-admin.php:112
actionadmin_enqueue_scriptsgpx-viewer.php:66
actionadmin_enqueue_scriptsgpx-viewer.php:67
actionwp_enqueue_scriptsgpx-viewer.php:70
actionwp_enqueue_scriptsgpx-viewer.php:72
actionwp_enqueue_scriptsgpx-viewer.php:131
Maintenance & Trust

GPX Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 14, 2025
PHP min version7.2.24
Downloads23K

Community Trust

Rating72/100
Number of ratings7
Active installs800
Developer Profile

GPX Viewer Developer Profile

axelkeller

1 plugin · 800 total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect GPX Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gpx-viewer/css/leaflet.css/wp-content/plugins/gpx-viewer/css/leaflet-betterscale.css/wp-content/plugins/gpx-viewer/css/gpxViewer.css/wp-content/plugins/gpx-viewer/js/leaflet.js/wp-content/plugins/gpx-viewer/js/leaflet-betterscale.js/wp-content/plugins/gpx-viewer/js/leaflet-gpx.js/wp-content/plugins/gpx-viewer/js/gpxMap.js/wp-content/plugins/gpx-viewer/js/gpxCleaner.js+2 more
Script Paths
/wp-content/plugins/gpx-viewer/js/leaflet.js/wp-content/plugins/gpx-viewer/js/leaflet-betterscale.js/wp-content/plugins/gpx-viewer/js/leaflet-gpx.js/wp-content/plugins/gpx-viewer/js/gpxMap.js/wp-content/plugins/gpx-viewer/js/gpxCleaner.js/wp-content/plugins/gpx-viewer/js/leaflet-editable-polyline.js+1 more

HTML / DOM Fingerprints

CSS Classes
gpxviewer-map
HTML Comments
<!-- GpxViewer Map --><!-- GpxViewer Map End -->
Data Attributes
data-gpxsrcdata-gpxautocenterdata-gpxlatdata-gpxlondata-gpxzoomdata-gpxwidth+12 more
JS Globals
gpxv_translationsedit_translationclean_translation
Shortcode Output
<div class="gpxviewer-map"
FAQ

Frequently Asked Questions about GPX Viewer