Ogp Plus Security & Risk Analysis

wordpress.org/plugins/ogp-plus

Add OGP tags.

500 active installs v1.10 PHP 8.0+ WP 4.7+ Updated Mar 29, 2026
facebookogpx
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ogp Plus Safe to Use in 2026?

Generally Safe

Score 100/100

Ogp Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "ogp-plus" v1.10 plugin demonstrates a strong security posture based on the provided static analysis. There are no identified dangerous functions, file operations, or external HTTP requests. The absence of any identified vulnerabilities in its history, including critical or high severity ones, is a significant positive indicator. Furthermore, all analyzed outputs are properly escaped, which is crucial for preventing cross-site scripting (XSS) vulnerabilities.

However, the analysis also reveals some areas for concern. The complete lack of AJAX handlers, REST API routes, shortcodes, or cron events, while seemingly reducing the attack surface, also means there are zero entry points analyzed for security. This could indicate that the plugin might not have any user-facing features that require interaction, or it could be that the static analysis tools were unable to identify them. More critically, the presence of a single SQL query that does not use prepared statements is a significant risk. This pattern, while minor in this instance (1 query), can be a gateway to SQL injection vulnerabilities if not properly handled, especially as the plugin evolves.

In conclusion, "ogp-plus" v1.10 benefits from a clean vulnerability history and good output escaping practices. The lack of identified critical or high-risk code signals is reassuring. The primary weakness lies in the single, unparameterized SQL query, which, though isolated, represents a potential point of exploitation. The very limited attack surface analysis, with zero entry points detected, warrants further investigation to ensure all functionalities are adequately secured.

Key Concerns

  • SQL queries without prepared statements
Vulnerabilities
None known

Ogp Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Ogp Plus Release Timeline

v1.10Current
v1.09
v1.08
v1.07
v1.06
v1.05
v1.04
v1.03
v1.02
v1.01
v1.00
Code Analysis
Analyzed Mar 16, 2026

Ogp Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries
Attack Surface

Ogp Plus Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Ogp Plus Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedMar 29, 2026
PHP min version8.0
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs500
Developer Profile

Ogp Plus Developer Profile

Katsushi Kawamori

54 plugins · 56K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
178 days
View full developer profile
Detection Fingerprints

How We Detect Ogp Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ogp-plus/css/style.css/wp-content/plugins/ogp-plus/js/script.js
Script Paths
/wp-content/plugins/ogp-plus/js/script.js
Version Parameters
ogp-plus/css/style.css?ver=ogp-plus/js/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Ogp Plus