
My Google Plus Widget Security & Risk Analysis
wordpress.org/plugins/mygooglepluswidgetThe Google Plus Widget is based on the official Google Plus API published by Google.
Is My Google Plus Widget Safe to Use in 2026?
Generally Safe
Score 85/100My Google Plus Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "mygooglepluswidget" plugin version 1.3 exhibits a mixed security posture. On one hand, it demonstrates good practices regarding SQL queries, exclusively using prepared statements, and has no recorded vulnerability history, suggesting a generally stable and secure past. The attack surface is also reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which is a significant strength in minimizing potential entry points.
However, several areas raise concerns. The presence of two "unserialize" function calls is a critical red flag. If the data being unserialized is not strictly controlled or sanitized from an external source, it can lead to Remote Code Execution vulnerabilities. Furthermore, the static analysis reveals a very low rate of proper output escaping (5%), indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. While the taint analysis shows no critical or high severity flows, the limited number of flows analyzed (5) and the presence of unsanitized paths in all of them warrants caution. The absence of any nonce or capability checks on the (non-existent) entry points, while seemingly positive due to the zero attack surface, means that if any entry points were ever added, they would be unprotected.
In conclusion, while the plugin has a clean vulnerability history and a seemingly small attack surface, the critical "unserialize" function usage and the pervasive lack of output escaping present significant security risks. The plugin developers should prioritize addressing these issues to improve its overall security posture. The low number of analyzed taint flows also suggests that a deeper, more comprehensive static analysis might be beneficial.
Key Concerns
- Dangerous function unserialize found
- Low percentage of properly escaped output
- Unsanitized paths in taint flows
- No nonce checks
- No capability checks
My Google Plus Widget Security Vulnerabilities
My Google Plus Widget Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
My Google Plus Widget Attack Surface
WordPress Hooks 4
Maintenance & Trust
My Google Plus Widget Maintenance & Trust
Maintenance Signals
Community Trust
My Google Plus Widget Alternatives
No alternatives data available yet.
My Google Plus Widget Developer Profile
1 plugin · 10 total installs
How We Detect My Google Plus Widget
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
gpw_widget_class