Simple Open Graph Security & Risk Analysis

wordpress.org/plugins/simple-open-graph

Simple Open Graph adds Open Graph meta data to the header

10 active installs v2.4 PHP + WP 3.0+ Updated Mar 6, 2015
facebookmetadataogpopen-graphopengraph
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Open Graph Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Open Graph has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "simple-open-graph" plugin v2.4 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified CVEs, coupled with a clean vulnerability history, suggests a well-maintained and secure codebase. The plugin also scores well on several best practices, including the complete absence of dangerous functions, zero unescaped output, and 100% of SQL queries utilizing prepared statements. The attack surface is minimal, with no AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points are reported.

However, a significant concern arises from the static analysis's finding that 0% of the 22 total outputs are properly escaped. This is a critical weakness. While the plugin may not directly process user input into SQL or other potentially harmful operations, unescaped output can still lead to cross-site scripting (XSS) vulnerabilities if dynamic data is rendered directly into the HTML without proper sanitization. The lack of nonce checks and capability checks further exacerbates this, meaning that even if an output is unintentionally dynamic, there are no built-in mechanisms to prevent unauthorized users from influencing that output or triggering actions that might expose sensitive information through unescaped data.

In conclusion, the plugin's minimal attack surface and clean vulnerability history are positive indicators. Nonetheless, the pervasive lack of output escaping represents a substantial security risk that could be exploited to inject malicious scripts. The absence of nonce and capability checks, while not directly causing an issue in themselves, reduces the plugin's resilience against potential attacks that leverage unescaped output.

Key Concerns

  • 0% output escaping on 22 outputs
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

Simple Open Graph Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Open Graph Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped22 total outputs
Attack Surface

Simple Open Graph Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headopengraph.php:151
actionadmin_menusimpleopengraph_options.php:3
actionadmin_initsimpleopengraph_options.php:23
Maintenance & Trust

Simple Open Graph Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 6, 2015
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Simple Open Graph Developer Profile

PcFrk256

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Open Graph

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Simple Open Graph