WPNeon GoCodes 2 Security & Risk Analysis

wordpress.org/plugins/wpneon-gocodes

Based on the original GoCodes plugin, "WPNeon GoCodes 2" is a revamnped URL redirection/shortener plugin. Great for podcasting and redirecti …

60 active installs v1.0 PHP 5.2.4+ WP 4.9+ Updated Nov 9, 2018
301redirectiontinyurlurlurl-shortener
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPNeon GoCodes 2 Safe to Use in 2026?

Generally Safe

Score 85/100

WPNeon GoCodes 2 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The wpneon-gocodes v1.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of exposed AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code demonstrates good practices by not utilizing dangerous functions, performing file operations, or making external HTTP requests. The SQL query usage, with 57% employing prepared statements, is a reasonable starting point, and the high rate of output escaping (83%) is commendable.

However, there are notable concerns. The taint analysis reveals that all three analyzed flows have unsanitized paths, and while they are not classified as critical or high severity, this warrants attention as it indicates potential vulnerabilities if malicious input were to be processed. The complete lack of nonce checks and capability checks across all entry points (even though the attack surface is currently zero) is a significant weakness that could be exploited if new entry points are introduced or if existing ones are not properly secured.

The vulnerability history is clean, with no recorded CVEs, which is a positive indicator of past development quality. However, the absence of a vulnerability history does not guarantee future security. The plugin's strengths lie in its limited attack surface and decent output escaping. Its weaknesses are primarily the potential for unsanitized input processing indicated by the taint analysis and the critical absence of nonces and capability checks for future extensibility.

Key Concerns

  • Taint flows with unsanitized paths (3/3)
  • No nonce checks found
  • No capability checks found
  • Some SQL queries not using prepared statements (43%)
  • Some output not properly escaped (17%)
Vulnerabilities
None known

WPNeon GoCodes 2 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPNeon GoCodes 2 Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
4 prepared
Unescaped Output
5
25 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

57% prepared7 total queries

Output Escaping

83% escaped30 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
wsc_gocodes_managemenu (menus.php:8)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WPNeon GoCodes 2 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitgocodes2.php:24
actionadmin_menugocodes2.php:25
filterfavorite_actionsgocodes2.php:106
actioninitmenus.php:302
actionwp_headmenus.php:303
Maintenance & Trust

WPNeon GoCodes 2 Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedNov 9, 2018
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

WPNeon GoCodes 2 Developer Profile

WPDean

1 plugin · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPNeon GoCodes 2

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPNeon GoCodes 2