WP-Routes Plugin Security & Risk Analysis

wordpress.org/plugins/wp-routes

Add Cycle Routes, Mountain Bike Trails, Running Tracks, Walking Routes and much more to your posts and pages.

100 active installs v0.4 PHP + WP 2.5+ Updated Nov 28, 2012
cyclingcycling-routesgoogle-mapsgpsgpsies
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Routes Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Routes Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The wp-routes v0.4 plugin exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by avoiding dangerous functions, utilizing prepared statements for all SQL queries, and having no recorded vulnerabilities or CVEs. The attack surface appears to be minimal, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. However, significant concerns arise from the code analysis. A very low percentage of output escaping (4%) is a critical weakness, potentially exposing the application to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever processed or displayed without proper sanitization. Furthermore, all analyzed taint flows (4 out of 4) have unsanitized paths, which could lead to various injection vulnerabilities if these paths involve user-controlled input. The absence of nonce checks and capability checks, while currently not directly exploitable due to a zero attack surface, represents a missed opportunity for robust security in case the plugin evolves to include user-facing entry points. In conclusion, while the plugin's current lack of known vulnerabilities and its use of prepared statements are strengths, the severe lack of output escaping and the high number of unsanitized taint flows are significant risks that require immediate attention.

Key Concerns

  • Low output escaping percentage
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WP-Routes Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Routes Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
49
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

4% escaped51 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
show_config (plugin.php:557)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Routes Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actioninitplugin.php:121
actionplugins_loadedplugin.php:481
actionsidebar_admin_setupplugin.php:507
actionsidebar_admin_pageplugin.php:508
actioninitwp-routes\plugin.php:121
actionplugins_loadedwp-routes\plugin.php:481
actionsidebar_admin_setupwp-routes\plugin.php:507
actionsidebar_admin_pagewp-routes\plugin.php:508
filterthe_contentwp-routes\wp-routes.php:55
actionwp_headwp-routes\wp-routes.php:56
filterthe_contentwp-routes.php:55
actionwp_headwp-routes.php:56
Maintenance & Trust

WP-Routes Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 28, 2012
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

WP-Routes Plugin Developer Profile

funkster

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Routes Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[gpsies url width height]
FAQ

Frequently Asked Questions about WP-Routes Plugin