Gweather Security & Risk Analysis

wordpress.org/plugins/gweather

With the gweather plugin you can display and embed Google Weather Feeds in your Wordpress posts and pages.

10 active installs v1.10 PHP + WP 2.5+ Updated Jan 17, 2010
atomembedfeedinlinerss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gweather Safe to Use in 2026?

Generally Safe

Score 85/100

Gweather has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "gweather" plugin v1.10 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The code analysis reveals no dangerous functions, all SQL queries are properly prepared, and all output is correctly escaped. This indicates good development practices in handling sensitive operations and data presentation. Furthermore, the plugin has no recorded vulnerabilities (CVEs) of any severity, which suggests a history of secure development and maintenance.

While the plugin demonstrates strengths in core security areas, there are a few areas that warrant attention. The presence of two file operations, without further context, could potentially pose a risk if not handled securely, although no unsanitized paths were identified in the taint analysis. The absence of nonce checks and capability checks, while not directly leading to identified vulnerabilities in this version, represents a potential area for future exploitation if the attack surface were to expand or if other vulnerabilities were introduced. The single shortcode entry point is also noteworthy; while currently unprotected, it remains a potential vector if its functionality were to be extended in a way that handles user input.

In conclusion, "gweather" v1.10 appears to be a secure plugin at this time, with a clean vulnerability history and robust coding practices in critical areas. The primary areas for improvement lie in ensuring the secure implementation of file operations and considering the addition of nonce and capability checks for its existing and any future entry points to further harden its security posture.

Key Concerns

  • File operations present without explicit checks
  • Shortcode entry point lacks nonce checks
  • Code lacks capability checks for entry points
Vulnerabilities
None known

Gweather Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Gweather Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Gweather Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0
Attack Surface

Gweather Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gweather] gweather.php:15
Maintenance & Trust

Gweather Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedJan 17, 2010
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Gweather Developer Profile

moklet

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Gweather

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
gweatherwp-link
HTML Comments
start of gweather content by gweather plugin v1.00 - http://www.citynews.co.za End of gweather content
Data Attributes
data-citydata-countrydata-tempdata-credit
Shortcode Output
<table class="gweather"><th colspan='4'><strong>Current conditions for &deg;C&deg;F
FAQ

Frequently Asked Questions about Gweather