XML News Sitemap Security & Risk Analysis

wordpress.org/plugins/xml-news-sitemap

This plugin provides a highly-configurable Google News XML Sitemap for WordPress.

70 active installs v1.2.5 PHP + WP 3.1+ Updated Mar 8, 2018
google-newsgoogle-news-sitemapgoogle-news-xml-sitemapnews-sitemapsitemap-for-google-news
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is XML News Sitemap Safe to Use in 2026?

Generally Safe

Score 85/100

XML News Sitemap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The xml-news-sitemap plugin v1.2.5 exhibits a generally strong security posture, with no recorded vulnerabilities or known CVEs. Static analysis reveals good practices such as the absence of direct SQL queries (all use prepared statements), a high percentage of properly escaped output, and the presence of nonce and capability checks. The limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without checks, further contributes to its security.

However, the presence of two `unserialize` function calls is a notable concern. While no taint flows were identified in this analysis, `unserialize` is inherently dangerous if used with untrusted input, as it can lead to object injection vulnerabilities. The plugin's lack of external HTTP requests, file operations, and bundled libraries is positive, but the potential for deserialization vulnerabilities remains the primary area of risk. Without more insight into how these `unserialize` calls are used and what data they process, it's difficult to definitively quantify the risk, but it warrants caution.

Overall, the plugin appears to be well-developed from a security perspective, with a clean vulnerability history and good implementation of common security controls. The main weakness lies in the potential for deserialization vulnerabilities due to the use of `unserialize`. If the input to these functions is not rigorously validated and sanitized, it could present a significant risk.

Key Concerns

  • Dangerous function 'unserialize' used
Vulnerabilities
None known

XML News Sitemap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

XML News Sitemap Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
1
11 escaped
Nonce Checks
2
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$gns_xml_genres = unserialize(get_post_meta( $post->ID, 'gns_xml_genres', true));gns_xml.php:203
unserialize$gns_xml_genres = unserialize($settings['gns_xml_genres']);gns_xml.php:205

Output Escaping

92% escaped12 total outputs
Attack Surface

XML News Sitemap Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_initgns_xml.php:44
actionadmin_menugns_xml.php:45
actionsave_postgns_xml.php:46
actionadd_meta_boxesgns_xml.php:47
filtertemplate_redirectgns_xml.php:48
actioninitgns_xml.php:281
Maintenance & Trust

XML News Sitemap Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedMar 8, 2018
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

XML News Sitemap Developer Profile

Justin Norton

3 plugins · 80 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect XML News Sitemap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
index-listwidefat
Data Attributes
gns_xml_noncenamegns_xml_includegns_xml_pubaccessgns_xml_genresgns_xml_publanguage
FAQ

Frequently Asked Questions about XML News Sitemap