Podamibe Custom User Gravatar Security & Risk Analysis

wordpress.org/plugins/podamibe-custom-user-gravatar

Replace Gravatar with custom picture in your gallery

3K active installs v1.0.8 PHP + WP 3.7.0+ Updated May 22, 2019
change-gravatarcustom-gravatargravatarpodamibe
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Podamibe Custom User Gravatar Safe to Use in 2026?

Generally Safe

Score 85/100

Podamibe Custom User Gravatar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The plugin 'podamibe-custom-user-gravatar' version 1.0.8 exhibits a generally good security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero-total attack surface, which is a strong indicator of robust security by design, as it minimizes potential entry points for attackers. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests further strengthens this positive assessment. The plugin also utilizes prepared statements for all its SQL queries, preventing common SQL injection vulnerabilities. Taint analysis also revealed no critical or high severity issues.

However, the plugin does present some areas for concern. The most significant is the extremely low percentage of properly escaped output (20%), meaning a large portion of the plugin's output is not being properly sanitized. This creates a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where attackers could inject malicious scripts into the website. The lack of nonce checks and capability checks on the few entry points that do exist, although currently zero, would be a critical oversight if any were introduced without proper authorization mechanisms. The vulnerability history being completely clean is a positive sign, but it doesn't negate the risks identified in the code analysis.

In conclusion, while the plugin's architecture is commendably secure with a minimal attack surface and no history of CVEs, the critical deficiency in output escaping poses a substantial XSS risk. This weakness, if exploited, could lead to serious security breaches. The absence of explicit authorization checks also leaves room for potential issues if the attack surface were to expand in future versions without these safeguards.

Key Concerns

  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Podamibe Custom User Gravatar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Podamibe Custom User Gravatar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped5 total outputs
Attack Surface

Podamibe Custom User Gravatar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionshow_user_profilepod-custom-user-gravatar.php:51
actionedit_user_profilepod-custom-user-gravatar.php:52
actionuser_new_formpod-custom-user-gravatar.php:53
actionpersonal_options_updatepod-custom-user-gravatar.php:59
actionedit_user_profile_updatepod-custom-user-gravatar.php:60
actionuser_registerpod-custom-user-gravatar.php:61
actionadmin_enqueue_scriptspod-custom-user-gravatar.php:66
filterget_avatarpod-custom-user-gravatar.php:71
filterplugin_row_metapod-custom-user-gravatar.php:73
Maintenance & Trust

Podamibe Custom User Gravatar Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedMay 22, 2019
PHP min version
Downloads78K

Community Trust

Rating100/100
Number of ratings5
Active installs3K
Developer Profile

Podamibe Custom User Gravatar Developer Profile

Podamibe Nepal

8 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Podamibe Custom User Gravatar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/podamibe-custom-user-gravatar/assets/js/pcg-custom-gravatar.js
Script Paths
/wp-content/plugins/podamibe-custom-user-gravatar/assets/js/pcg-custom-gravatar.js
Version Parameters
podamibe-custom-user-gravatar/assets/js/pcg-custom-gravatar.js?ver=

HTML / DOM Fingerprints

CSS Classes
pcg-remove-img
Data Attributes
pcg_use_custom_gravatarpcg-use-custom-gravatarpcg-custom-gravatar-picpcg-upload-profile-picpcg-custom-gravatar
JS Globals
pcg-custom-gravatar
FAQ

Frequently Asked Questions about Podamibe Custom User Gravatar