KGR Login with Google Security & Risk Analysis

wordpress.org/plugins/kgr-login-with-google

Login or register to WP usign Sign In with Google.

0 active installs v1.2 PHP 7.0+ WP 3.1.0+ Updated Dec 6, 2021
googleloginoauth2register
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is KGR Login with Google Safe to Use in 2026?

Generally Safe

Score 85/100

KGR Login with Google has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The kgr-login-with-google plugin v1.2 exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, not performing raw SQL queries, and limiting file operations. The presence of nonce and capability checks, although limited, is also a positive indicator. However, the plugin has a significant security concern due to its single AJAX handler lacking any authentication checks, presenting a direct entry point for potential attacks. The low percentage of properly escaped output suggests a risk of cross-site scripting (XSS) vulnerabilities, as data displayed to users may not be sufficiently sanitized. The absence of recorded vulnerabilities in its history is a strength, implying a generally stable codebase, but this should not overshadow the identified weaknesses. The lack of taint analysis results also makes it difficult to definitively rule out more complex injection vulnerabilities.

Overall, the most critical concern is the unprotected AJAX handler, which could be exploited by unauthenticated users to perform unintended actions within the plugin's functionality. Coupled with the insufficient output escaping, this plugin carries a moderate to high risk. While the lack of past vulnerabilities and its avoidance of raw SQL are commendable, the unprotected entry point and potential for XSS require immediate attention. Recommendations should focus on implementing robust authentication and authorization for all AJAX actions and ensuring all output is properly escaped to mitigate these risks.

Key Concerns

  • Unprotected AJAX handler
  • Low output escaping percentage
Vulnerabilities
None known

KGR Login with Google Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

KGR Login with Google Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
11 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

39% escaped28 total outputs
Attack Surface
1 unprotected

KGR Login with Google Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

noprivwp_ajax_kgr_login_with_google_redirectlogin.php:54
WordPress Hooks 8
actioninitindex.php:32
filterplugin_action_linksindex.php:37
actionlogin_formlogin.php:22
actionregister_formlogin.php:32
actionwp_metalogin.php:42
actionadmin_menusettings.php:6
actionadmin_initsettings.php:33
actionadmin_action_kgr-login-with-google-clearsettings.php:119
Maintenance & Trust

KGR Login with Google Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedDec 6, 2021
PHP min version7.0
Downloads838

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

KGR Login with Google Developer Profile

Konstantinos Raktivan

4 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect KGR Login with Google

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<div style="margin: 0 6px 16px 0;"></div>
FAQ

Frequently Asked Questions about KGR Login with Google