Polzo ogMeta Security & Risk Analysis

wordpress.org/plugins/polzo-ogmeta

Plugin insert open graph metadata on your WordPress site.

10 active installs v0.3 PHP + WP 3.0+ Updated Aug 5, 2012
metaopen-graphthumbnails
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Polzo ogMeta Safe to Use in 2026?

Generally Safe

Score 85/100

Polzo ogMeta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "polzo-ogmeta" v0.3 plugin exhibits a generally strong security posture, characterized by a lack of known vulnerabilities and a clean record of past CVEs. The static analysis reveals no immediately apparent critical code signals such as dangerous functions, raw SQL queries, or external HTTP requests. The plugin also appears to have a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without authentication. However, a significant concern arises from the taint analysis, which identified one flow with an unsanitized path. This, coupled with a low percentage of properly escaped output (45%), suggests potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled rigorously. The absence of nonce checks and capability checks further exacerbates this risk, as it implies that even if an attack vector were found, there are fewer built-in WordPress protections to mitigate it. While the plugin has a clean vulnerability history, this analysis indicates that ongoing vigilance regarding output escaping and input sanitization is crucial to maintain its security.

Key Concerns

  • Flow with unsanitized path found
  • Low percentage of properly escaped output
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Polzo ogMeta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Polzo ogMeta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

45% escaped11 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<admin> (admin.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Polzo ogMeta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_menuadmin.php:5
actionadmin_initadmin.php:66
filterlanguage_attributesogMeta.php:21
actionwp_headogMeta.php:27
actionwp_headogMeta.php:68
filterpolzo_ogmeta_titleogMeta.php:107
filterpolzo_ogmeta_urlogMeta.php:108
filterpolzo_ogmeta_site_nameogMeta.php:109
filterwpogMeta.php:111
actionwp_headogMeta.php:164
actionwp_headogMeta.php:174
Maintenance & Trust

Polzo ogMeta Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedAug 5, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Polzo ogMeta Developer Profile

akurganow

3 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Polzo ogMeta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/polzo-ogmeta/admin.css/wp-content/plugins/polzo-ogmeta/admin.js

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about Polzo ogMeta