OGPanic Security & Risk Analysis

wordpress.org/plugins/ogpanic

OGPanic generates beautiful og-images automatically from your post's title, featured image and etc.

10 active installs v1.0.14 PHP + WP 5.0.1+ Updated Unknown
facebookimageog-imageogpopen-graph-protocol
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OGPanic Safe to Use in 2026?

Generally Safe

Score 100/100

OGPanic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "ogpanic" v1.0.14 plugin exhibits a generally positive security posture based on the provided static analysis. A significant strength is the absence of identified vulnerabilities in its history, suggesting a mature and well-maintained codebase. Furthermore, the plugin demonstrates good security practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and performing capability checks. The small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, also contributes to its robust security. However, a notable concern is the 41% of output that is not properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is rendered without adequate sanitization. While the taint analysis found no critical or high-severity issues, the lack of proper output escaping remains a potential avenue for exploitation. Overall, while the plugin is strong in preventing common injection attacks and has a clean vulnerability history, the unescaped output is a weakness that requires attention.

Key Concerns

  • Significant percentage of unescaped output
Vulnerabilities
None known

OGPanic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

OGPanic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
17 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

59% escaped29 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_options (admin\class-og-panic-admin.php:171)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

OGPanic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_noticesadmin\class-og-panic-admin.php:388
actionplugins_loadedincludes\class-og-panic.php:144
actionadmin_enqueue_scriptsincludes\class-og-panic.php:159
actionadmin_enqueue_scriptsincludes\class-og-panic.php:160
actionadmin_menuincludes\class-og-panic.php:161
actionadmin_postincludes\class-og-panic.php:162
actionsave_postincludes\class-og-panic.php:163
actionadmin_noticesincludes\class-og-panic.php:164
actionadmin_initincludes\class-og-panic.php:165
actioninitincludes\class-og-panic.php:169
actionenqueue_block_editor_assetsincludes\class-og-panic.php:170
actionopen_graph_protocol_metasincludes\class-og-panic.php:185
Maintenance & Trust

OGPanic Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

OGPanic Developer Profile

RJ

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OGPanic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/og-panic/css/og-panic-admin.css/wp-content/plugins/og-panic/js/og-panic-admin.js
Script Paths
/wp-content/plugins/og-panic/js/og-panic-admin.js
Version Parameters
og-panic-admin.css?ver=og-panic-admin.js?ver=

HTML / DOM Fingerprints

JS Globals
Og_Panic_Adminog_panic_admin_params
FAQ

Frequently Asked Questions about OGPanic