My Google Plus Widget Security & Risk Analysis

wordpress.org/plugins/mygooglepluswidget

The Google Plus Widget is based on the official Google Plus API published by Google.

10 active installs v1.3 PHP + WP 2.0.2+ Updated Sep 21, 2011
google-plus-widget-api
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is My Google Plus Widget Safe to Use in 2026?

Generally Safe

Score 85/100

My Google Plus Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "mygooglepluswidget" plugin version 1.3 exhibits a mixed security posture. On one hand, it demonstrates good practices regarding SQL queries, exclusively using prepared statements, and has no recorded vulnerability history, suggesting a generally stable and secure past. The attack surface is also reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, which is a significant strength in minimizing potential entry points.

However, several areas raise concerns. The presence of two "unserialize" function calls is a critical red flag. If the data being unserialized is not strictly controlled or sanitized from an external source, it can lead to Remote Code Execution vulnerabilities. Furthermore, the static analysis reveals a very low rate of proper output escaping (5%), indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. While the taint analysis shows no critical or high severity flows, the limited number of flows analyzed (5) and the presence of unsanitized paths in all of them warrants caution. The absence of any nonce or capability checks on the (non-existent) entry points, while seemingly positive due to the zero attack surface, means that if any entry points were ever added, they would be unprotected.

In conclusion, while the plugin has a clean vulnerability history and a seemingly small attack surface, the critical "unserialize" function usage and the pervasive lack of output escaping present significant security risks. The plugin developers should prioritize addressing these issues to improve its overall security posture. The low number of analyzed taint flows also suggests that a deeper, more comprehensive static analysis might be beneficial.

Key Concerns

  • Dangerous function unserialize found
  • Low percentage of properly escaped output
  • Unsanitized paths in taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

My Google Plus Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

My Google Plus Widget Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
39
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserializereturn unserialize($ret['data']);google-api-php-client\src\cache\apiApcCache.php:79
unserialize$data = unserialize($data);google-api-php-client\src\cache\apiFileCache.php:98

Output Escaping

5% escaped41 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

5 flows5 with unsanitized paths
<index> (google-api-php-client\examples\latitude\index.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

My Google Plus Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menugooglepluswidget.php:28
actionadmin_menugooglepluswidget.php:29
actionwidgets_initgooglepluswidget.php:90
actionadmin_initgooglepluswidget.php:173
Maintenance & Trust

My Google Plus Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 21, 2011
PHP min version
Downloads4K

Community Trust

Rating40/100
Number of ratings1
Active installs10
Alternatives

My Google Plus Widget Alternatives

No alternatives data available yet.

Developer Profile

My Google Plus Widget Developer Profile

Arjen Ketelaar

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect My Google Plus Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
gpw_widget_class
FAQ

Frequently Asked Questions about My Google Plus Widget