Open Graph Pro Security & Risk Analysis

wordpress.org/plugins/ogp

Adds Open Graph tags to your blog. Control how your posts and pages are presented on Facebook and other social media sites. No configuration needed.

2K active installs v1.0 PHP + WP 2.9+ Updated Nov 28, 2017
facebookopen-graphopengraphsocialsocial-media
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Open Graph Pro Safe to Use in 2026?

Generally Safe

Score 85/100

Open Graph Pro has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "ogp" plugin v1.0 demonstrates a generally strong security posture based on the provided static analysis. It lacks any identified attack surface vectors like AJAX handlers, REST API routes, or shortcodes, which significantly reduces the potential for external exploitation. Furthermore, the absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), file operations, and external HTTP requests are positive indicators. The presence of nonce and capability checks, albeit minimal, also suggests an awareness of security best practices.

However, a notable concern arises from the output escaping. With 30 total outputs and only 33% properly escaped, there is a significant risk of cross-site scripting (XSS) vulnerabilities. This means that data displayed to users might not be adequately sanitized, potentially allowing attackers to inject malicious scripts. The lack of any recorded vulnerabilities in its history is a positive sign, suggesting the plugin has been developed with security in mind or has not been a target. Despite the limited attack surface and good practices in other areas, the poor output escaping is a critical weakness that requires immediate attention.

In conclusion, while the "ogp" plugin has strong foundational security by minimizing its attack surface and avoiding common pitfalls like raw SQL queries, the high proportion of unescaped output presents a substantial risk. The plugin's vulnerability history is clean, which is reassuring, but this should not lead to complacency given the identified code-level weakness. Prioritizing the remediation of unescaped output is paramount to securing this plugin.

Key Concerns

  • Output not properly escaped
Vulnerabilities
None known

Open Graph Pro Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Open Graph Pro Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
20
10 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped30 total outputs
Attack Surface

Open Graph Pro Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterlanguage_attributesogp.php:165
actionwp_headogp.php:166
actionsave_postogp.php:471
actioninitogp.php:593
actionadmin_initogp.php:594
actionadmin_menuogp.php:595
Maintenance & Trust

Open Graph Pro Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedNov 28, 2017
PHP min version
Downloads44K

Community Trust

Rating0/100
Number of ratings0
Active installs2K
Developer Profile

Open Graph Pro Developer Profile

Martin Lormes

5 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Open Graph Pro

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
xmlns:ogxmlns:fb
FAQ

Frequently Asked Questions about Open Graph Pro