showGplus Security & Risk Analysis

wordpress.org/plugins/showgplus

A small plugin whose purpose is to show G+ "Follow us", using a shortcode.

10 active installs v1.01 PHP + WP 2.1+ Updated Sep 13, 2012
admingooglegoogle-plusgplus
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is showGplus Safe to Use in 2026?

Generally Safe

Score 85/100

showGplus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'showgplus' v1.01 plugin exhibits a generally strong security posture based on the provided static analysis. There are no detected dangerous functions, all SQL queries utilize prepared statements, and all outputs are properly escaped. Furthermore, the plugin has no recorded vulnerability history, indicating a lack of publicly known exploits. This suggests the developers have followed good security practices in its implementation.

However, the analysis does reveal some areas for caution. The plugin lacks any nonce checks and capability checks, which is a significant concern. While the current attack surface is small and has no unprotected entry points detected, the absence of these fundamental security mechanisms means that if new entry points were introduced or existing ones were to become vulnerable, there would be no built-in protection against unauthorized actions. The taint analysis also shows no flows, but this could be due to the limited scope of the analysis or the lack of complex input handling, rather than an inherent absence of risk.

In conclusion, 'showgplus' v1.01 appears to be well-developed from a code hygiene perspective, with no exploitable vulnerabilities flagged in the static analysis or history. The primary weakness lies in the absence of crucial authorization checks (nonces and capabilities). While the risk is currently mitigated by a small and seemingly secured attack surface, this oversight represents a potential future vulnerability if the plugin's functionality or interaction with WordPress evolves.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

showGplus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

showGplus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

showGplus Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[showgplus] showGplus.php:42
Maintenance & Trust

showGplus Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedSep 13, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

showGplus Developer Profile

faniry

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect showGplus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/showgplus/style.css
Script Paths
https://apis.google.com/js/plusone.js
Version Parameters
showgplus/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
g-plus
Data Attributes
data-widthdata-heightdata-hrefdata-rel
JS Globals
window.__gcfg
Shortcode Output
<div class="g-plus" data-width= data-height= data-href= data-rel="publisher"></div>
FAQ

Frequently Asked Questions about showGplus