NextGEN Gallery Authors Security & Risk Analysis

wordpress.org/plugins/nextgen-gallery-authors

This plugin will let you show galleries filtered by author.

10 active installs v0.2.5 PHP + WP 3.1+ Updated Unknown
nextgen-gallerynextgen-gallery-authors
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is NextGEN Gallery Authors Safe to Use in 2026?

Generally Safe

Score 100/100

NextGEN Gallery Authors has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The security posture of nextgen-gallery-authors v0.2.5 appears to be relatively strong based on this static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the lack of critical or high-severity taint flows is a positive indicator. The plugin also demonstrates some good practices, including the presence of a nonce check and a capability check, which are essential for securing entry points. However, the code analysis does reveal areas of concern that warrant attention. Specifically, the use of raw SQL queries without prepared statements is a significant risk, as it opens the door to SQL injection vulnerabilities. The fact that 100% of the identified SQL queries are unescaped further exacerbates this risk. Additionally, the complete lack of output escaping for all identified outputs means that any dynamic data displayed to users could be vulnerable to cross-site scripting (XSS) attacks. The plugin's vulnerability history is clean, with no recorded CVEs, which is a strong positive. However, this should not breed complacency, especially given the identified coding weaknesses that could potentially lead to future vulnerabilities. The absence of external HTTP requests and file operations reduces the risk of certain types of attacks, but the SQL and output escaping issues remain the primary security concerns.

Key Concerns

  • Raw SQL queries without prepared statements
  • 100% of SQL queries are unescaped
  • 0% of outputs properly escaped
Vulnerabilities
None known

NextGEN Gallery Authors Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

NextGEN Gallery Authors Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

NextGEN Gallery Authors Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_menuauthors\admin\admin.php:14
actionadmin_print_stylesauthors\admin\admin.php:15
actionnggdate_after_titleauthors\admin\pages\options\class-options.php:19
filterngg_album_galleries_before_pagingauthors\authors.php:19
filterngg_album_galleryobjectauthors\authors.php:37
filterquery_varsauthors\authors.php:47
filterrewrite_rules_arrayauthors\authors.php:58
actionwp_loadedauthors\authors.php:69
actionplugins_loadednextgen-gallery-authors.php:46
actionadmin_noticesnextgen-gallery-authors.php:54
Maintenance & Trust

NextGEN Gallery Authors Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

NextGEN Gallery Authors Developer Profile

roberto.c

3 plugins · 100 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect NextGEN Gallery Authors

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/nextgen-gallery-authors/authors/admin/css/style.css

HTML / DOM Fingerprints

CSS Classes
wrapupdated
Data Attributes
id="message"
JS Globals
rcwdNggauthors
FAQ

Frequently Asked Questions about NextGEN Gallery Authors