GPXconnect Security & Risk Analysis

wordpress.org/plugins/gpxconnect

Download GPX data to Garmin GPS devices.

10 active installs v1.0 PHP + WP 3.0+ Updated Mar 16, 2013
geogpsgpxmapsnavigation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GPXconnect Safe to Use in 2026?

Generally Safe

Score 85/100

GPXconnect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The gpxconnect v1.0 plugin exhibits a generally good security posture based on the static analysis provided. It boasts zero known CVEs, no critical or high severity taint flows, and a limited attack surface with only one entry point (a shortcode). Furthermore, all SQL queries are prepared, indicating a defense against SQL injection. The absence of file operations and external HTTP requests also reduces potential attack vectors.

However, a significant concern lies in the output escaping. With 5 total outputs and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the shortcode that originates from user input or other dynamic sources could be exploited by an attacker to inject malicious scripts. The plugin also lacks nonce checks and has only one capability check associated with its shortcode, suggesting potential authorization bypass issues if the shortcode handles sensitive operations or displays sensitive data.

In conclusion, while the plugin demonstrates strengths in areas like SQL security and a small attack surface, the complete lack of output escaping is a critical weakness that overshadows these positives. This needs immediate attention to prevent XSS attacks. The limited authorization checks on the shortcode also warrant further investigation depending on its functionality.

Key Concerns

  • All outputs are unescaped
  • Shortcode lacks nonce checks
  • Only one capability check for shortcode
Vulnerabilities
None known

GPXconnect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GPXconnect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

GPXconnect Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gpxconnect] gpxconnect.php:49
WordPress Hooks 4
actionwp_enqueue_scriptsgpxconnect.php:40
actionwp_headgpxconnect.php:41
actionadmin_menugpxconnect.php:42
actionadmin_initgpxconnect.php:43
Maintenance & Trust

GPXconnect Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMar 16, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GPXconnect Developer Profile

davidkeen

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GPXconnect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gpxconnect/js/garmin/device/GarminDeviceDisplay.js
Script Paths
prototypegarmin-device-display

HTML / DOM Fingerprints

JS Globals
Garmin.DeviceDisplaygpxFileNameload
Shortcode Output
<div id="garminDisplay">&#160;</div><script type='text/javascript'>var gpxFileName = ''; load();</script><textarea id='dataString' style='display:none'>
FAQ

Frequently Asked Questions about GPXconnect