
Use Google Libraries Security & Risk Analysis
wordpress.org/plugins/use-google-librariesAllows your site to use common javascript libraries from Google's AJAX Libraries CDN, rather than from WordPress's own copies.
Is Use Google Libraries Safe to Use in 2026?
Generally Safe
Score 85/100Use Google Libraries has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "use-google-libraries" plugin v1.6.2.3 exhibits a generally strong security posture based on the provided static analysis. There are no identified dangerous functions, SQL queries are all prepared, and all outputs are properly escaped. The absence of file operations, external HTTP requests (except for one, which needs scrutiny), and taint analysis findings further contribute to a positive assessment. Crucially, the plugin has no recorded vulnerability history, suggesting a history of secure development and maintenance.
However, a notable concern is the complete lack of nonce checks and capability checks across all identified entry points, which are zero. While the current attack surface is zero, this indicates a fundamental gap in security implementation. If the plugin were to evolve and introduce new entry points, such as AJAX handlers, REST API routes, or shortcodes in the future, the absence of these checks would immediately expose the site to potential Cross-Site Request Forgery (CSRF) or unauthorized access vulnerabilities. The single external HTTP request also warrants investigation to ensure it is not inadvertently introducing a security risk, such as facilitating SSRF or fetching malicious content.
In conclusion, the plugin's current state is secure due to its minimal attack surface and good coding practices in specific areas. The complete absence of authentication and authorization checks on potential entry points, even if currently non-existent, represents a significant weakness that could become a critical vulnerability if the plugin's functionality expands. The lack of historical vulnerabilities is a positive indicator but does not negate the need for robust security measures on any future development.
Key Concerns
- No nonce checks on entry points
- No capability checks on entry points
- External HTTP request without context
Use Google Libraries Security Vulnerabilities
Use Google Libraries Code Analysis
SQL Query Safety
Use Google Libraries Attack Surface
WordPress Hooks 3
Maintenance & Trust
Use Google Libraries Maintenance & Trust
Maintenance Signals
Community Trust
Use Google Libraries Alternatives
WP jQuery Plus
wp-jquery-plus
Loads jQuery from a CDN using the exact version as your current WordPress install
Admin Menu Slide
admin-menu-slide
Adds a feature to hide admin menu and make it slide when hovering on the edge of the screen.
Do Not Load jQuery
do-not-load-jquery
Stops WordPress plugins from loading jQuery.
AH Footer Scripts
evolution-footer-scripts
This small plugin moves all scripts (including jQuery) to the footer to help speed up page load times, while keep stylesheets in the header.
indomap
indomap
jQuery plugin to create google maps with advanced features (overlays, clusters, callbacks, events...)
Use Google Libraries Developer Profile
1 plugin · 10K total installs
How We Detect Use Google Libraries
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/use-google-libraries/assets/css/admin.css/wp-content/plugins/use-google-libraries/assets/js/admin.jsjqueryjquery-ui-corejquery-ui-accordionjquery-ui-autocompletejquery-ui-buttonjquery-ui-datepicker+45 more/use-google-libraries/assets/css/admin.css?ver=/use-google-libraries/assets/js/admin.js?ver=HTML / DOM Fingerprints
Copyright 2008-2017 Jason Penney (email : jpenney@jczorkmid.net )This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation using version 2 of the License.This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA+16 moreJCP_UseGoogleLibraries_cache