Search by Google Security & Risk Analysis

wordpress.org/plugins/search-google

Search by Google widget.

100 active installs v1.9 PHP + WP 3.0+ Updated Sep 5, 2020
googlesearchsidebarwidget
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 5, 2025
Safety Verdict

Is Search by Google Safe to Use in 2026?

Use With Caution

Score 63/100

Search by Google has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 5, 2025Updated 5yr ago
Risk Assessment

The "search-google" plugin v1.9 exhibits a mixed security posture. While it has no identified entry points in the static analysis (AJAX, REST API, shortcodes, cron), indicating a small attack surface, several code signals raise concerns. The presence of the dangerous `create_function` is a significant red flag, as it can lead to code injection vulnerabilities if user input is not meticulously sanitized before being passed to it. Furthermore, only 29% of output is properly escaped, suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities where untrusted data could be rendered in the browser without adequate sanitization.

The plugin's vulnerability history shows one known medium severity CVE related to XSS, which is currently unpatched. This unpatched vulnerability, combined with the static analysis findings pointing to potential XSS issues (low output escaping), strongly suggests that the plugin is susceptible to XSS attacks. The lack of nonce checks and capability checks, while not directly penalized due to the absence of unprotected entry points, are generally considered good security practices that are missing here. Overall, the absence of immediate critical threats in taint analysis is positive, but the presence of the dangerous function and poor output escaping, alongside an unpatched XSS vulnerability, creates a substantial risk.

In conclusion, while the plugin's limited attack surface is a strength, the code quality issues, particularly the use of `create_function` and inadequate output escaping, coupled with an unpatched XSS vulnerability, significantly lower its security. Users should exercise caution and prioritize updating or replacing this plugin. The identified risks are not theoretical but are supported by both static analysis and historical vulnerability data.

Key Concerns

  • Unpatched CVE (medium severity)
  • Dangerous function: create_function
  • Low output escaping (29%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
1

Search by Google Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58832medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Search by Google <= 1.9 - Authenticated (Administrator+) Stored Cross-Site Scripting

Sep 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Search by Google Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
15
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("WP_Widget_Search_Google");')search-google.php:84

Output Escaping

29% escaped21 total outputs
Attack Surface

Search by Google Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwidgets_initsearch-google.php:84
actionwp_enqueue_scriptssearch-google.php:94
actionplugins_loadedsearch-google.php:100
filterplugin_row_metasearch-google.php:110
Maintenance & Trust

Search by Google Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedSep 5, 2020
PHP min version
Downloads29K

Community Trust

Rating96/100
Number of ratings9
Active installs100
Developer Profile

Search by Google Developer Profile

webvitaly

14 plugins · 128K total installs

66
trust score
Avg Security Score
81/100
Avg Patch Time
396 days
View full developer profile
Detection Fingerprints

How We Detect Search by Google

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/search-google/css/search-google.css/wp-content/plugins/search-google/js/search-google.js
Script Paths
/wp-content/plugins/search-google/js/search-google.js
Version Parameters
search-google/css/search-google.css?ver=search-google/js/search-google.js?ver=

HTML / DOM Fingerprints

CSS Classes
widget_search_googlesearch_google_formpseudoqpseudositesearchgoogle
HTML Comments
<!-- Search by Google plugin v.
Data Attributes
pseudoqpseudositesearchgooglebtnG
FAQ

Frequently Asked Questions about Search by Google