Admin Events Extended Security & Risk Analysis

wordpress.org/plugins/admin-events-extended

Adds further source to community events and news to the admin dashboard widget.

0 active installs v0.0.1 PHP + WP 2.8+ Updated Nov 16, 2017
communitydashboardeventsnewswidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin Events Extended Safe to Use in 2026?

Generally Safe

Score 85/100

Admin Events Extended has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the provided static analysis, the "admin-events-extended" v0.0.1 plugin exhibits an excellent security posture regarding common web application vulnerabilities. The absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and the guaranteed proper escaping of all output demonstrate strong adherence to secure coding practices. Furthermore, the plugin's limited attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces the potential for exploitation.

Despite these strengths, there are a few areas that warrant attention. The presence of a single external HTTP request without explicit mention of its handling or validation is a minor concern. More significantly, the complete lack of nonce and capability checks across all identified entry points (even though there are none currently) suggests a potential oversight in how future features might be secured. The plugin's clean vulnerability history with zero known CVEs is a very positive indicator, suggesting a well-maintained codebase. However, the version number v0.0.1 implies this is a very early release, and the absence of historical vulnerabilities might be more a reflection of its limited exposure rather than guaranteed long-term security.

In conclusion, this plugin is currently very secure due to its minimal attack surface and strong coding practices. The primary risks lie in the potential for future vulnerabilities if new entry points are added without proper authentication and authorization mechanisms (nonces and capability checks). The external HTTP request should also be monitored for secure implementation. The excellent foundation, however, makes it a good candidate for continued secure development.

Key Concerns

  • External HTTP requests without explicit handling
  • Lack of nonce checks on entry points
  • Lack of capability checks on entry points
Vulnerabilities
None known

Admin Events Extended Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Admin Events Extended Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0
Attack Surface

Admin Events Extended Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadedincludes\class-admin-events-extended.php:131
actionhttp_responseincludes\class-admin-events-extended.php:146
Maintenance & Trust

Admin Events Extended Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedNov 16, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Admin Events Extended Developer Profile

toddhalfpenny

9 plugins · 21K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
371 days
View full developer profile
Detection Fingerprints

How We Detect Admin Events Extended

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Admin Events Extended