
gee Search Plus, improved WordPress search Security & Risk Analysis
wordpress.org/plugins/gsearch-plusExtends WordPress search engine to taxonomies, custom fields and media, sorts results by relevance or date, and more. Simple and clean!
Is gee Search Plus, improved WordPress search Safe to Use in 2026?
Use With Caution
Score 64/100gee Search Plus, improved WordPress search has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The gsearch-plus plugin v1.4.4 exhibits a mixed security posture. On the positive side, the static analysis reveals a commendably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. The code also demonstrates good practices by using prepared statements for all SQL queries and performing at least one nonce check. However, a significant concern arises from the output escaping, with only 43% of identified outputs being properly escaped. This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities where user-supplied input might not be adequately sanitized before being displayed to other users.
The vulnerability history is a critical red flag, with one currently unpatched medium severity CVE related to Cross-Site Scripting. The fact that this vulnerability was recently discovered (May 2024) and remains unpatched indicates a lack of timely security maintenance and remediation for known issues. This pattern of past XSS vulnerabilities coupled with the current incomplete output escaping in the static analysis strongly suggests that XSS is a recurring and potentially ongoing risk for this plugin. While the plugin has strengths in its limited attack surface and SQL handling, the unpatched XSS vulnerability and the prevalence of unescaped output are significant weaknesses that expose users to serious security risks.
Key Concerns
- Unpatched CVE (Medium Severity)
- Low percentage of properly escaped output
gee Search Plus, improved WordPress search Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
gee Search Plus, improved WordPress search <= 1.4.4 - Authenticated (Admin+) Stored Cross-Site Scripting
gee Search Plus, improved WordPress search Release Timeline
gee Search Plus, improved WordPress search Code Analysis
Output Escaping
gee Search Plus, improved WordPress search Attack Surface
WordPress Hooks 16
Maintenance & Trust
gee Search Plus, improved WordPress search Maintenance & Trust
Maintenance Signals
Community Trust
gee Search Plus, improved WordPress search Alternatives
Relevanssi – A Better Search
relevanssi
Relevanssi replaces the default search with a partial-match search that sorts results by relevance. It also indexes comments and shortcode content.
WP Search with Algolia
wp-search-with-algolia
Use the power of Algolia AI Search & Discovery to enhance your website's search. Enable AI-powered Autocomplete and InstantSearch for fast, a …
Better Search – Relevant search results for WordPress
better-search
Better Search replaces the default WordPress search with a better search engine that gives contextual results sorted by relevance.
Super Search – Custom Post Types
eps-super-search
Super Search is a customizable widget which allows you to create search forms for custom post types.
Search, Filters & Merchandising for WooCommerce
instantsearch-for-woocommerce
Maximize your store sales with this easy-to-install plugin. Give shoppers a well-designed advanced search bar with live search suggestions.
gee Search Plus, improved WordPress search Developer Profile
2 plugins · 140 total installs
How We Detect gee Search Plus, improved WordPress search
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/gsearch-plus/inc/css/admin.cssgsearch-plus/style.css?ver=gsearch-plus/script.js?ver=HTML / DOM Fingerprints
gsp-highlight<!-- This is the GEE Search Plus admin page --><!-- geeSearch Plus, by GOMO -->data-gsp-highlight-colordata-gsp-highlight-areaGSP_highlight_colorGSP_highlight_areaGSP_scripts_vars