Single Author G+ META Security & Risk Analysis

wordpress.org/plugins/single-author-g-meta

This Plugin adds the required Author Meta Tags to the header of all the pages on your WordPress site. It is specifically designed to be as simple as p …

100 active installs v1.1 PHP + WP 2.0.2+ Updated May 21, 2014
googlegoogle-authorgoogle-plusgoogle-verified-authorverified-author
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Single Author G+ META Safe to Use in 2026?

Generally Safe

Score 85/100

Single Author G+ META has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "single-author-g-meta" plugin v1.1 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of AJAX handlers, REST API routes, shortcodes, cron events, and file operations significantly limits its attack surface. Furthermore, the use of prepared statements for all SQL queries is a strong indicator of good secure coding practices. The lack of any recorded CVEs and vulnerability history is also reassuring, suggesting a history of stable and secure development.

However, a significant concern arises from the complete lack of output escaping, meaning that any data processed or displayed by the plugin could potentially be vulnerable to cross-site scripting (XSS) attacks. The absence of nonce checks and capability checks also means that there are no built-in mechanisms to verify user intent or permissions for any potential actions, which could be exploited if an attack surface were to be introduced or discovered. While the current attack surface is zero, the lack of these fundamental security checks leaves the plugin in a precarious position should any entry points be added or exposed in future versions or through interactions with other plugins.

In conclusion, the plugin's limited attack surface and secure SQL handling are strong positives. However, the critical failure in output escaping and the absence of essential authorization and validation checks represent significant security weaknesses that could be easily exploited. The plugin is currently secure due to its lack of exploitable entry points, but this is a fragile security, and the identified code issues pose a substantial risk if any interaction with user-supplied data or external sources occurs.

Key Concerns

  • No output escaping found
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

Single Author G+ META Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Single Author G+ META Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Single Author G+ META Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headpw_gp_sa.php:19
actionadmin_menupw_gp_sa.php:37
actionplugins_loadedpw_gp_sa.php:64
Maintenance & Trust

Single Author G+ META Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedMay 21, 2014
PHP min version
Downloads5K

Community Trust

Rating90/100
Number of ratings2
Active installs100
Developer Profile

Single Author G+ META Developer Profile

williampatton

4 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Single Author G+ META

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<link rel="author" href="
FAQ

Frequently Asked Questions about Single Author G+ META