Trulia Security & Risk Analysis

wordpress.org/plugins/trulia

Easily add Trulia maps to your sidebar or embed Trulia.com real estate maps in your content.

10 active installs v1.0.1 PHP + WP 2.8+ Updated Unknown
housingshortcodetruliatrulia-comwidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Trulia Safe to Use in 2026?

Generally Safe

Score 100/100

Trulia has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "trulia" v1.0.1 plugin presents a mixed security posture. On the positive side, it shows good practices regarding SQL query handling and a complete absence of known vulnerabilities. The plugin does not utilize any dangerous functions or perform file operations, which are common sources of security issues. However, significant concerns arise from the static analysis. The presence of an unprotected AJAX handler represents a critical entry point that attackers could potentially exploit without authentication. Furthermore, the extremely low percentage of properly escaped output (5%) suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website.

The taint analysis indicates that while there are no critical or high severity unsanitized flows, the presence of two flows with unsanitized paths warrants attention, especially when combined with the poor output escaping. The lack of nonce and capability checks on entry points like the AJAX handler is a major security oversight. Given the lack of historical vulnerabilities, it's difficult to definitively assess the plugin's long-term security track record, but the current analysis reveals immediate risks that need to be addressed.

Key Concerns

  • AJAX handler without authentication
  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • No capability checks on entry points
  • Taint flows with unsanitized paths
Vulnerabilities
None known

Trulia Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Trulia Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
36
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

5% escaped38 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ajax_trulia_locations (trulia.php:101)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Trulia Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 1

authwp_ajax_trulia_locationstrulia.php:88

Shortcodes 2

[trulia] trulia.php:96
[Trulia] trulia.php:97
WordPress Hooks 5
actionwidgets_inittrulia.php:30
actionwp_print_stylestrulia.php:89
actionwp_print_footer_scriptstrulia.php:90
actionadmin_print_styles-widgets.phptrulia.php:92
actionadmin_print_scripts-widgets.phptrulia.php:93
Maintenance & Trust

Trulia Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Trulia Developer Profile

Zack Katz

23 plugins · 14K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Trulia

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/trulia/trulia.css/wp-content/plugins/trulia/trulia.js
Script Paths
/wp-content/plugins/trulia/trulia.js
Version Parameters
trulia.js?ver=1.0.1

HTML / DOM Fingerprints

CSS Classes
truliatrulia_containercc-arrow
Data Attributes
rel="#trulia-settings-id="trulia-settings-
FAQ

Frequently Asked Questions about Trulia