WPGAlerts Security & Risk Analysis

wordpress.org/plugins/wpgalerts

Add Google Alerts to any WordPress Page or Text Widget with a [WPGAlerts] short code.

10 active installs v1.0 PHP + WP 3.7+ Updated Apr 20, 2014
alertalertsgooglenews
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPGAlerts Safe to Use in 2026?

Generally Safe

Score 85/100

WPGAlerts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "wpgalerts" v1.0 plugin exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and has a seemingly small attack surface, with no unprotected AJAX handlers or REST API routes identified. It also incorporates nonce and capability checks, along with prepared statements for a portion of its SQL queries, indicating some adherence to good security practices.

However, significant concerns arise from the static code analysis. The most critical issue is that 100% of output is not properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, the taint analysis reveals one flow with unsanitized paths, which, while not classified as critical or high in severity by the tool, still represents a potential entry point for malicious input. The presence of SQL queries that do not utilize prepared statements further contributes to the risk of SQL injection vulnerabilities.

Given the absence of past vulnerabilities, the plugin might appear secure, but the current code analysis flags are substantial. The lack of output escaping is a fundamental security flaw that could be exploited regardless of past history. The plugin needs to address its output sanitization and taint flow issues to improve its security. The current state suggests a plugin that has not been thoroughly audited for common web vulnerabilities, particularly output handling.

Key Concerns

  • 100% of output is not properly escaped
  • Taint flow with unsanitized paths
  • SQL queries without prepared statements (55% lack)
Vulnerabilities
None known

WPGAlerts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WPGAlerts Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
5 prepared
Unescaped Output
15
0 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

45% prepared11 total queries

Output Escaping

0% escaped15 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
WPGAlerts_plugin_options (WPGA_main.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPGAlerts Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[WPGAlerts] WPGA_main.php:513
WordPress Hooks 2
actionadmin_menuWPGA_main.php:512
actionadmin_noticesWPGA_main.php:520
Maintenance & Trust

WPGAlerts Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 20, 2014
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings1
Active installs10
Developer Profile

WPGAlerts Developer Profile

datainterlock

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPGAlerts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpgalerts/images/WPGAicon.png

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPGAlerts