Very simple Google map Security & Risk Analysis

wordpress.org/plugins/very-simple-google-map

This is s very simple plugin for Google map

10 active installs v1.0 PHP + WP 3.3+ Updated Unknown
categoriesgoogle-mapsmapmapsshortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Very simple Google map Safe to Use in 2026?

Generally Safe

Score 100/100

Very simple Google map has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "very-simple-google-map" plugin v1.0 presents a mixed security posture. On one hand, the absence of known CVEs and a clean vulnerability history suggest a generally stable plugin. The code analysis also shows promising signs, with all SQL queries utilizing prepared statements and no recorded file operations or external HTTP requests, which are common sources of vulnerabilities. However, several concerning aspects were identified during static analysis. The presence of the `create_function` dangerous function is a significant red flag, as it can lead to arbitrary code execution if not handled with extreme care. Furthermore, a low output escaping rate (28%) indicates a high risk of cross-site scripting (XSS) vulnerabilities, where untrusted data might be rendered directly in the browser without proper sanitization. The lack of capability checks and nonce checks on any entry points, though the attack surface is currently zero, means that if any entry points are introduced in future updates without proper security considerations, they will be immediately vulnerable.

While the plugin's current lack of known vulnerabilities and a zero attack surface are positive indicators, the identified code signals, particularly the use of `create_function` and the poor output escaping, represent tangible risks. The absence of any recorded vulnerabilities in the past could simply mean the plugin hasn't been extensively targeted or thoroughly audited for these specific weaknesses. Therefore, a cautious approach is warranted, prioritizing the remediation of the identified code issues to solidify the plugin's security.

Key Concerns

  • Use of dangerous function 'create_function'
  • Low output escaping rate (28%)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Very simple Google map Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Very simple Google map Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
21
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("gmaps");') );very-simple-google-map.php:84

Output Escaping

28% escaped29 total outputs
Attack Surface

Very simple Google map Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initvery-simple-google-map.php:84
Maintenance & Trust

Very simple Google map Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Very simple Google map Developer Profile

ThemesVila

14 plugins · 2K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Very simple Google map

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_gmaps
Data Attributes
id="gmaps"name="gmaps"class="widefat"
FAQ

Frequently Asked Questions about Very simple Google map