GS to WP Security & Risk Analysis

wordpress.org/plugins/gs-to-wp

Import pages and media from GetSimple CMS to WordPress

20 active installs v1.0.2 PHP + WP 3.0.1+ Updated Apr 5, 2017
datagetsimpleimportsql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is GS to WP Safe to Use in 2026?

Generally Safe

Score 85/100

GS to WP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'gs-to-wp' v1.0.2 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of known CVEs, critical taint flows, and dangerous function usage are significant strengths. Furthermore, the complete reliance on prepared statements for SQL queries and the presence of nonce checks indicate good development practices in these areas. The limited attack surface with no exposed AJAX, REST API routes, shortcodes, or cron events is also a positive indicator.

However, there are areas for improvement. The low percentage (29%) of properly escaped output is a concern, as it suggests a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization. While no critical or high severity taint flows were identified, the lack of detailed taint analysis limits the ability to definitively rule out all potential path manipulation vulnerabilities. The absence of capability checks on any entry points, although the entry points are currently zero, signifies a potential weakness if new entry points are added in future versions without proper authorization.

Overall, the plugin appears to be developed with security in mind, particularly regarding SQL injection and common web attack vectors. The lack of historical vulnerabilities further reinforces this. The primary area of concern is the insufficient output escaping, which should be addressed to further harden the plugin's security. The lack of capability checks represents a minor risk given the current minimal attack surface, but warrants attention for future development.

Key Concerns

  • Low output escaping percentage
  • No capability checks on entry points
Vulnerabilities
None known

GS to WP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

GS to WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
3
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

GS to WP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitgs-to-wp.php:12
actionadmin_menugs-to-wp.php:13
Maintenance & Trust

GS to WP Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 5, 2017
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings1
Active installs20
Developer Profile

GS to WP Developer Profile

Jacques Malgrange

4 plugins · 530 total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
777 days
View full developer profile
Detection Fingerprints

How We Detect GS to WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gs-to-wp/css/gs2wp.css

HTML / DOM Fingerprints

CSS Classes
gs2wpgs2wpTablegs2wpOption
JS Globals
jQuery
FAQ

Frequently Asked Questions about GS to WP