gee Search Plus, improved WordPress search Security & Risk Analysis

wordpress.org/plugins/gsearch-plus

Extends WordPress search engine to taxonomies, custom fields and media, sorts results by relevance or date, and more. Simple and clean!

100 active installs v1.4.4 PHP + WP 3.5+ Updated Dec 2, 2016
custom-post-types-searchcustom-taxonomies-searchimprove-searchrelevancesearch
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEMay 7, 2024
Safety Verdict

Is gee Search Plus, improved WordPress search Safe to Use in 2026?

Use With Caution

Score 64/100

gee Search Plus, improved WordPress search has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: May 7, 2024Updated 9yr ago
Risk Assessment

The gsearch-plus plugin v1.4.4 exhibits a mixed security posture. On the positive side, the static analysis reveals a commendably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. The code also demonstrates good practices by using prepared statements for all SQL queries and performing at least one nonce check. However, a significant concern arises from the output escaping, with only 43% of identified outputs being properly escaped. This suggests a potential for Cross-Site Scripting (XSS) vulnerabilities where user-supplied input might not be adequately sanitized before being displayed to other users.

The vulnerability history is a critical red flag, with one currently unpatched medium severity CVE related to Cross-Site Scripting. The fact that this vulnerability was recently discovered (May 2024) and remains unpatched indicates a lack of timely security maintenance and remediation for known issues. This pattern of past XSS vulnerabilities coupled with the current incomplete output escaping in the static analysis strongly suggests that XSS is a recurring and potentially ongoing risk for this plugin. While the plugin has strengths in its limited attack surface and SQL handling, the unpatched XSS vulnerability and the prevalence of unescaped output are significant weaknesses that expose users to serious security risks.

Key Concerns

  • Unpatched CVE (Medium Severity)
  • Low percentage of properly escaped output
Vulnerabilities
1 published

gee Search Plus, improved WordPress search Security Vulnerabilities

CVEs by Year

1 CVE in 2024 · unpatched
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-34560medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

gee Search Plus, improved WordPress search <= 1.4.4 - Authenticated (Admin+) Stored Cross-Site Scripting

May 7, 2024Unpatched
Version History

gee Search Plus, improved WordPress search Release Timeline

v1.4.4Current1 CVE
v1.4.31 CVE
v1.4.21 CVE
v1.4.11 CVE
v1.4.01 CVE
v1.3.11 CVE
v1.3.01 CVE
v1.2.01 CVE
v1.1.81 CVE
v1.1.71 CVE
v1.1.61 CVE
v1.1.51 CVE
v1.1.41 CVE
v1.1.31 CVE
v1.1.21 CVE
v1.1.11 CVE
v1.1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

gee Search Plus, improved WordPress search Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
12 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped28 total outputs
Attack Surface

gee Search Plus, improved WordPress search Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actioninitgee-search-plus.php:66
actionplugins_loadedgee-search-plus.php:69
actionplugins_loadedgee-search-plus.php:76
actionadmin_noticesinc\class-gsp-admin-notice.php:24
actionadmin_noticesinc\class-gsp-admin-notice.php:25
actionadmin_noticesinc\class-gsp-admin-notice.php:28
actionadmin_initinc\class-gsp-admin.php:22
actionadmin_menuinc\class-gsp-admin.php:23
filtergee_search_original_resultsinc\class-gsp-media-search.php:18
filterposts_searchinc\class-gsp-media-search.php:62
actionpre_get_postsinc\class-search-plus.php:30
actionpre_get_postsinc\class-search-plus.php:32
filterwp_search_stopwordsinc\class-search-plus.php:35
filterposts_searchinc\class-search-plus.php:38
actionwpinc\class-search-plus.php:41
actionwp_enqueue_scriptsinc\class-search-plus.php:48
Maintenance & Trust

gee Search Plus, improved WordPress search Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedDec 2, 2016
PHP min version
Downloads14K

Community Trust

Rating94/100
Number of ratings15
Active installs100
Developer Profile

gee Search Plus, improved WordPress search Developer Profile

luistinygod

2 plugins · 140 total installs

77
trust score
Avg Security Score
75/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect gee Search Plus, improved WordPress search

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gsearch-plus/inc/css/admin.css
Version Parameters
gsearch-plus/style.css?ver=gsearch-plus/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
gsp-highlight
HTML Comments
<!-- This is the GEE Search Plus admin page --><!-- geeSearch Plus, by GOMO -->
Data Attributes
data-gsp-highlight-colordata-gsp-highlight-area
JS Globals
GSP_highlight_colorGSP_highlight_areaGSP_scripts_vars
FAQ

Frequently Asked Questions about gee Search Plus, improved WordPress search