WP Open Graph Meta Security & Risk Analysis

wordpress.org/plugins/wp-open-graph-meta

Adds Facebook Open Graph Meta Elements to blog posts/pages to avoid no thumbnail, wrong title/description issue etc.

200 active installs v1.1 PHP + WP 3.0+ Updated May 30, 2012
metametatagsopen-graphopengraph
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Open Graph Meta Safe to Use in 2026?

Generally Safe

Score 85/100

WP Open Graph Meta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "wp-open-graph-meta" v1.1 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, cron events, or file operations significantly limits the potential attack surface. Furthermore, the code demonstrates good practices by avoiding dangerous functions, conducting all SQL queries using prepared statements, and not making external HTTP requests. The lack of any recorded vulnerabilities, including CVEs, further bolsters this positive assessment.

However, there are areas for improvement. The analysis indicates a concern with output escaping, with 50% of detected outputs not being properly escaped. While the total number of outputs is small, unescaped output can still lead to cross-site scripting (XSS) vulnerabilities if malicious data is injected. The absence of nonce checks and capability checks, though not directly tied to an attack surface in this analysis, represents a missed opportunity to enhance security for any future endpoints that might be introduced. The plugin's minimal complexity and history of security may lead to complacency, but the identified output escaping issue warrants attention.

In conclusion, wp-open-graph-meta v1.1 appears to be a secure plugin with no critical or high-risk vulnerabilities identified in its current version. Its limited attack surface and adherence to secure coding practices for database operations are commendable. The primary area of concern is the insufficient output escaping, which could be exploited. The vulnerability history is a strong positive indicator, suggesting a well-maintained and secure codebase. Developers should prioritize addressing the output escaping issue to achieve a more robust security profile.

Key Concerns

  • Output escaping is not properly handled for 50% of outputs.
  • Lack of nonce checks on potential entry points.
  • Lack of capability checks on potential entry points.
Vulnerabilities
None known

WP Open Graph Meta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Open Graph Meta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

WP Open Graph Meta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headwp-open-graph-meta.php:29
Maintenance & Trust

WP Open Graph Meta Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMay 30, 2012
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

WP Open Graph Meta Developer Profile

Sven

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Open Graph Meta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Open Graph Meta