ACF Repeater Editor Accordion Security & Risk Analysis

wordpress.org/plugins/acf-repeater-editor-accordion

Use with ACF repeater plugin for easier page editing. This plugin adds an accordion feature to the page edit view.

100 active installs v1.0 PHP + WP 3.0+ Updated Sep 21, 2015
acfadvanced-custom-fieldscollapserepeater
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ACF Repeater Editor Accordion Safe to Use in 2026?

Generally Safe

Score 85/100

ACF Repeater Editor Accordion has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin "acf-repeater-editor-accordion" v1.0 exhibits an excellent security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals indicate a strong adherence to secure coding practices, with no dangerous functions, file operations, or external HTTP requests. All SQL queries are correctly prepared, and there are no recorded vulnerability histories, suggesting a development process that prioritizes security. This lack of known vulnerabilities and secure code implementations paints a picture of a highly secure plugin.

However, the analysis does highlight a critical area of concern: output escaping. With 100% of outputs not being properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. While the attack surface is minimal, any interaction that leads to output being rendered on the frontend or backend without proper sanitization could be exploited. The zero taint flows are positive but do not negate the inherent risk introduced by the unescaped output. Therefore, while the plugin is strong in many areas, the lack of output escaping is a significant weakness that needs immediate attention.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

ACF Repeater Editor Accordion Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ACF Repeater Editor Accordion Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

ACF Repeater Editor Accordion Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_headacf-repeater-accordion.php:24
Maintenance & Trust

ACF Repeater Editor Accordion Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 21, 2015
PHP min version
Downloads6K

Community Trust

Rating60/100
Number of ratings1
Active installs100
Developer Profile

ACF Repeater Editor Accordion Developer Profile

jeremywar

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF Repeater Editor Accordion

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-repeater-editor-accordion/css/custom.css/wp-content/plugins/acf-repeater-editor-accordion/js/custom.js
Script Paths
/wp-content/plugins/acf-repeater-editor-accordion/js/custom.js
Version Parameters
acf-repeater-editor-accordion/css/custom.css?ver=acf-repeater-editor-accordion/js/custom.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ACF Repeater Editor Accordion