gText Widget Security & Risk Analysis

wordpress.org/plugins/gtext-widget

This is multilingual text widget, which works with qTranslate plugin.

70 active installs v1.3 PHP + WP + Updated Sep 5, 2014
adminlanguagemultilingualtextwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is gText Widget Safe to Use in 2026?

Generally Safe

Score 85/100

gText Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "gtext-widget" v1.3 plugin exhibits a generally good security posture based on the provided static analysis. The absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events, coupled with no detected dangerous functions, SQL queries not using prepared statements, file operations, or external HTTP requests, suggests a minimal attack surface. Furthermore, the lack of recorded vulnerabilities, including CVEs, indicates a history of security diligence or a lack of previously discovered issues.

However, a significant concern arises from the output escaping. With 6 total outputs and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic content rendered by the widget that is not correctly escaped can be manipulated by attackers to inject malicious scripts, impacting users' browsers and potentially leading to session hijacking or other attacks. The absence of nonce and capability checks, while not directly leading to an attack in the absence of other entry points, represents a missed opportunity for defense-in-depth, especially if new entry points were to be introduced in future versions.

In conclusion, while the plugin's architectural design and vulnerability history are positive, the critical flaw in output escaping overshadows these strengths. The plugin is currently vulnerable to XSS attacks due to unsanitized output. Addressing the output escaping is paramount to improving its security.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

gText Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

gText Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

gText Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initguri-widget.php:94
Maintenance & Trust

gText Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.0
Last updatedSep 5, 2014
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

gText Widget Developer Profile

Guram Kajaia

1 plugin · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect gText Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gtext-widget/gtext-widget.php

HTML / DOM Fingerprints

CSS Classes
GTextWidget
HTML Comments
<!--:$gtext_lang--><!--:-->
Data Attributes
style="width:400px;margin-left:10px;"style="width:400px;height:300px;margin-left:10px;"
FAQ

Frequently Asked Questions about gText Widget