WP Gravatar Https Security & Risk Analysis

wordpress.org/plugins/wp-gravatar-https

WP Gravatar Https

30 active installs v1.1 PHP + WP 3.0+ Updated Nov 19, 2015
gravatarhttps
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Gravatar Https Safe to Use in 2026?

Generally Safe

Score 85/100

WP Gravatar Https has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-gravatar-https" v1.1 plugin exhibits an excellent security posture based on the provided static analysis. There are no identified attack vectors through AJAX, REST API, shortcodes, or cron events. Furthermore, the code demonstrates strong security practices by avoiding dangerous functions, using prepared statements for all SQL queries, and properly escaping all outputs. The absence of file operations and external HTTP requests also minimizes potential vulnerabilities. Taint analysis found no unsanitized data flows, indicating a clean codebase in this regard.

The vulnerability history is also clean, with no recorded CVEs. This, combined with the positive static analysis results, suggests a well-developed and securely coded plugin. The lack of nonce checks and capability checks, while often points of concern, are not indicative of a risk here given the complete lack of any identified entry points. The plugin's primary function appears to be straightforward, and the developers have implemented it without introducing common security weaknesses.

In conclusion, the "wp-gravatar-https" v1.1 plugin appears to be highly secure. Its strengths lie in its minimal attack surface, robust code hygiene (prepared statements, output escaping), and a clean vulnerability history. There are no discernible security risks or concerns based on the provided data. The plugin follows best practices for secure WordPress development.

Vulnerabilities
None known

WP Gravatar Https Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Gravatar Https Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP Gravatar Https Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterget_avatarwp-gravatar-https.php:22
Maintenance & Trust

WP Gravatar Https Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 19, 2015
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

WP Gravatar Https Developer Profile

610216

3 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Gravatar Https

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Gravatar Https