Link Google Calendar Security & Risk Analysis

wordpress.org/plugins/link-google-calendar

A plugin that allows administrator to set Google Calendar embedded link in admin back-end and use shortcode to place on a page, post or sidebar.

300 active installs v2.0.0 PHP + WP 3.5+ Updated May 1, 2018
calendarembedded-google-calendargoogle-calendargoogle-calendar-embed-link
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Link Google Calendar Safe to Use in 2026?

Generally Safe

Score 85/100

Link Google Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "link-google-calendar" plugin v2.0.0 presents a mixed security posture. On the positive side, it has a small attack surface with no unprotected entry points, no dangerous functions, no file operations, no external HTTP requests, and a complete lack of known vulnerabilities (CVEs). This suggests a generally well-maintained and less exposed plugin. However, significant concerns arise from the static analysis. All SQL queries are executed without prepared statements, which is a major risk for SQL injection vulnerabilities. Furthermore, a significant portion of output escaping is missing, creating potential for cross-site scripting (XSS) attacks. The taint analysis reveals flows with unsanitized paths, though thankfully, no critical or high severity issues were identified in this area, indicating that while data handling might be loose, it has not yet led to severe exploitable paths.

The absence of known vulnerabilities is a strong positive, implying either diligent security practices or a lack of targeted attacks. However, the identified code quality issues, particularly the lack of prepared statements for SQL and insufficient output escaping, are fundamental security weaknesses that could be easily exploited if an attacker were to find a suitable entry point. While the plugin is not currently flagged with known issues, these inherent code weaknesses represent a substantial underlying risk that should be addressed to improve its overall security robustness.

Key Concerns

  • SQL queries without prepared statements
  • Low percentage of properly escaped output
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Link Google Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Link Google Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
7
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

22% escaped9 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
link_google_calendar_page (link-google-calendar.php:130)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Link Google Calendar Attack Surface

Entry Points6
Unprotected0

Shortcodes 6

[lgc] link-google-calendar.php:27
[lgc_1] link-google-calendar.php:28
[lgc_2] link-google-calendar.php:29
[lgc_3] link-google-calendar.php:30
[lgc_4] link-google-calendar.php:31
[lgc_5] link-google-calendar.php:32
WordPress Hooks 4
actionadmin_menulink-google-calendar.php:19
actionadmin_initlink-google-calendar.php:20
actionadmin_noticeslink-google-calendar.php:22
actionadmin_initlink-google-calendar.php:23
Maintenance & Trust

Link Google Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 1, 2018
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings6
Active installs300
Developer Profile

Link Google Calendar Developer Profile

dxladner

3 plugins · 360 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Link Google Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/link-google-calendar/css/lgc-admin-styles.css
Version Parameters
link-google-calendar/css/lgc-admin-styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
gcl-admin-sectiongcl-logo-sectiongcl-admin-body-section
Shortcode Output
<div align="center">[lgc][lgc_1][lgc_2]
FAQ

Frequently Asked Questions about Link Google Calendar