wp-greet Security & Risk Analysis

wordpress.org/plugins/wp-greet

wp-greet sends greeting cards from your WordPress blog. It works with WordPress-, NextGen- or NextCellentGallery.

50 active installs v6.3 PHP + WP 4.1+ Updated Dec 6, 2025
cardemailgreetcardgreetingsend
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 20, 2025
Safety Verdict

Is wp-greet Safe to Use in 2026?

Generally Safe

Score 99/100

wp-greet has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jan 20, 2025Updated 3mo ago
Risk Assessment

The "wp-greet" v6.3 plugin demonstrates a generally good security posture, with a low attack surface and a strong reliance on prepared statements for SQL queries. The majority of output appears to be properly escaped, and robust nonce and capability checks are in place across various code signals. This indicates a developer who is aware of common WordPress security best practices.

However, the presence of a "dangerous function" (unserialize) and a significant number of "flows with unsanitized paths" (6 out of 8 analyzed) are notable concerns. While no "critical" or "high" severity taint flows were identified in this analysis, the potential for issues arising from unserialized, unsanitized data remains. The plugin's vulnerability history, while showing no currently unpatched CVEs, does include a past medium severity Cross-Site Request Forgery (CSRF) vulnerability. This suggests that while the developer is responsive to patching, certain types of vulnerabilities have occurred in the past.

In conclusion, "wp-greet" v6.3 is a relatively secure plugin due to its limited attack surface and good implementation of core WordPress security features. The primary areas for caution are the use of `unserialize` and the identified unsanitized paths, which warrant careful monitoring and potential further investigation, especially if new vulnerabilities arise. The historical CSRF vulnerability should also be a reminder for users to ensure the plugin is always kept up-to-date.

Key Concerns

  • Dangerous function unserialize present
  • High number of unsanitized paths
  • Past medium severity CVE
Vulnerabilities
1

wp-greet Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-13444medium · 6.1Cross-Site Request Forgery (CSRF)

wp-greet <= 6.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Jan 20, 2025 Patched in 6.3 (1d)
Code Analysis
Analyzed Mar 16, 2026

wp-greet Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
43 prepared
Unescaped Output
79
196 escaped
Nonce Checks
8
Capability Checks
1
File Operations
4
External Requests
2
Bundled Libraries
1

Dangerous Functions Found

unserialize$options['wp-greet-galarr'] = unserialize( get_option( 'wp-greet-galarr' ) );wpg-func.php:151

Bundled Libraries

TinyMCE

SQL Query Safety

98% prepared44 total queries

Output Escaping

71% escaped275 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

8 flows6 with unsanitized paths
<wpg-stamped> (wpg-stamped.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

wp-greet Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wp-greet] wp-greet.php:78
WordPress Hooks 21
filterpre_get_postswp-greet.php:81
filterngg_create_gallery_linkwp-greet.php:85
filterngg_get_thumbcodewp-greet.php:87
filterpost_gallerywp-greet.php:92
filterrender_blockwp-greet.php:94
actionwpgreet_sendcard_linkwp-greet.php:100
actionwpgreet_sendcard_mailwp-greet.php:101
actionwp_print_scriptswp-greet.php:134
actionwp_print_styleswp-greet.php:135
actionadmin_noticeswp-greet.php:294
actionadmin_menuwp-greet.php:296
actioninitwp-greet.php:299
actionwp_enqueue_scriptswp-greet.php:300
actionadmin_enqueue_scriptswp-greet.php:301
filtermce_external_pluginswpg-form.php:873
filterwp_get_attachment_linkwpg-func.php:859
filterpost_gallerywpg-func.php:957
filterattachment_fields_to_editwpg-func.php:1090
filterattachment_fields_to_savewpg-func.php:1107
filterwp-greet-offerstampwpg-offerstamp.php:146
filterwp-greet-buddypress-group-selectorwpg-offerstamp.php:212

Scheduled Events 4

wpgreet_sendcard_link
wpgreet_sendcard_mail
wpgreet_sendcard_link
wpgreet_sendcard_mail
Maintenance & Trust

wp-greet Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 6, 2025
PHP min version
Downloads35K

Community Trust

Rating98/100
Number of ratings10
Active installs50
Developer Profile

wp-greet Developer Profile

tuxlog

6 plugins · 6K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
660 days
View full developer profile
Detection Fingerprints

How We Detect wp-greet

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-greet/wp-greet.css/wp-content/plugins/wp-greet/smilies_tinymce.js/wp-content/plugins/wp-greet/smilies.js/wp-content/plugins/wp-greet/flatpickr/flatpickr.min.js/wp-content/plugins/wp-greet/flatpickr/flatpickr.min.css/wp-content/plugins/wp-greet/flatpickr/l10n//wp-content/plugins/wp-greet/howler/howler.min.js/wp-content/plugins/wp-greet/wpg_admin.js
Script Paths
wp-greet/smilies_tinymce.jswp-greet/smilies.jswp-greet/flatpickr/flatpickr.min.jswp-greet/flatpickr/flatpickr.min.csswp-greet/flatpickr/l10n/wp-greet/howler/howler.min.js+1 more
Version Parameters
wp-greet.css?ver=smilies_tinymce.js?ver=smilies.js?ver=flatpickr.min.js?ver=flatpickr.min.css?ver=l10n/howler.min.js?ver=wpg_admin.js?ver=

HTML / DOM Fingerprints

JS Globals
wpg_options
Shortcode Output
[wp-greet]
FAQ

Frequently Asked Questions about wp-greet