Open Graph Tags Security & Risk Analysis

wordpress.org/plugins/wp-og

Define and optimize what the Facebook crawler should pick up and show when people share your content.

200 active installs v0.1.2 PHP + WP 4.0+ Updated Nov 1, 2015
facebookfacebook-metafacebook-ogfacebook-shareopen
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Open Graph Tags Safe to Use in 2026?

Generally Safe

Score 85/100

Open Graph Tags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-og" plugin v0.1.2 demonstrates a generally strong security posture based on the provided static analysis. The absence of known vulnerabilities in its history and the robust handling of SQL queries with prepared statements are significant positive indicators. Furthermore, the presence of nonce and capability checks suggests an awareness of fundamental WordPress security practices. The plugin also has no external dependencies or file operations, which reduces the potential attack surface.

However, the static analysis does reveal areas for improvement. A notable concern is the moderate rate of unescaped output (58% properly escaped), which could leave the plugin susceptible to cross-site scripting (XSS) vulnerabilities if sensitive data is not handled carefully. The current taint analysis shows no identified flows, which is a positive sign, but the limited scope of analysis (0 flows analyzed) might not capture all potential issues. Given the lack of identified vulnerabilities in its history and the small attack surface, the overall risk is currently assessed as low, but the unescaped output warrants attention.

In conclusion, "wp-og" v0.1.2 exhibits good foundational security practices, particularly in its SQL handling and authentication checks. The absence of historical vulnerabilities is a strong point. The primary weakness lies in the incomplete output escaping, which, while not leading to immediate critical risks based on the provided data, represents a potential attack vector that should be addressed to further strengthen the plugin's security.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Open Graph Tags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Open Graph Tags Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
21 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

58% escaped36 total outputs
Attack Surface

Open Graph Tags Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedincludes\class-wp-og.php:140
actionadmin_enqueue_scriptsincludes\class-wp-og.php:155
actionadmin_enqueue_scriptsincludes\class-wp-og.php:156
actionadmin_initincludes\class-wp-og.php:157
actionadmin_menuincludes\class-wp-og.php:158
actionadd_meta_boxesincludes\class-wp-og.php:160
actionsave_postincludes\class-wp-og.php:161
actionwp_headincludes\class-wp-og.php:175
Maintenance & Trust

Open Graph Tags Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedNov 1, 2015
PHP min version
Downloads8K

Community Trust

Rating90/100
Number of ratings2
Active installs200
Developer Profile

Open Graph Tags Developer Profile

filipstefansson

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Open Graph Tags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-og/css/wp-og-admin.css/wp-content/plugins/wp-og/js/wp-og-admin.js
Script Paths
/wp-content/plugins/wp-og/js/wp-og-admin.js
Version Parameters
wp-og-admin.css?ver=wp-og-admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
wp_og_inner_meta_box_nonce
FAQ

Frequently Asked Questions about Open Graph Tags