Posts in Map Security & Risk Analysis

wordpress.org/plugins/posts-in-map

Add short code [gmap] to insert in post a google map with advanced features and place geolocalized post in this map

10 active installs v0.3 PHP + WP 3.0+ Updated Feb 13, 2013
gmapgoogle-mapsgooglemapsjavascriptjquery
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Posts in Map Safe to Use in 2026?

Generally Safe

Score 85/100

Posts in Map has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The static analysis of the 'posts-in-map' plugin v0.3 reveals an exceptionally clean codebase from a security perspective. There are no identified dangerous functions, all SQL queries use prepared statements, and all outputs are properly escaped. The absence of file operations, external HTTP requests, and any observed taint flows further strengthens this assessment. Furthermore, the plugin has no recorded vulnerability history, indicating a strong track record.

However, the analysis also highlights potential areas for concern. The complete lack of any capability checks, nonce checks, AJAX handlers, REST API routes, or shortcodes, while indicative of a minimal attack surface, also suggests that the plugin might not be performing any security-critical operations or handling user input that would necessitate these checks. This could be a sign of a very basic plugin, or it could mean that any potential vulnerabilities, if they existed, would be harder to detect through these common security signals. The plugin's strengths lie in its apparent adherence to secure coding practices for the limited functionality it appears to offer, but the lack of common security mechanisms warrants a degree of caution, especially if the plugin's functionality is more complex than initially apparent.

Key Concerns

  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Posts in Map Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Posts in Map Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Posts in Map Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Posts in Map Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedFeb 13, 2013
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Posts in Map Developer Profile

lucdecri

5 plugins · 320 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Posts in Map

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/posts-in-map/markers/
Script Paths
http://maps.google.com/maps/api/js?sensor=false

HTML / DOM Fingerprints

CSS Classes
gmap
HTML Comments
/* @TODO box per l'inserimento della georef */
Data Attributes
data-gmap3
JS Globals
showMapaddMarkermaparrMarkersarrInfoWindowsmapInit
Shortcode Output
<div id="gmap"
FAQ

Frequently Asked Questions about Posts in Map