Advanced Plugin Search Security & Risk Analysis

wordpress.org/plugins/advanced-plugin-search

Free yourself from the limitations of the standard plugin search delivered by WordPress core. List plugins that have been updated within the last X mo …

0 active installs v0.0.2 PHP 5.4+ WP 3.8+ Updated Dec 5, 2017
advanced-plugin-searchapsklickplugin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Advanced Plugin Search Safe to Use in 2026?

Generally Safe

Score 85/100

Advanced Plugin Search has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The advanced-plugin-search v0.0.2 plugin presents a mixed security posture. On the positive side, it has a very small attack surface with only one AJAX handler and no REST API routes, shortcodes, or cron events. Crucially, the single AJAX handler appears to have capability checks, which is a good practice. The vulnerability history is clean, with no recorded CVEs, suggesting a relatively stable past. However, significant concerns arise from the code analysis. The presence of the `unserialize` function is a major red flag, as it can lead to remote code execution if not handled with extreme care and validation of the serialized data. Furthermore, a high percentage of SQL queries (60%) are not using prepared statements, increasing the risk of SQL injection vulnerabilities. The low rate of proper output escaping (13%) is another critical weakness, opening the door to cross-site scripting (XSS) attacks. The taint analysis also highlights that all analyzed flows have unsanitized paths, which, while not classified as critical or high severity in this instance, indicates a general lack of input sanitization. These code-level weaknesses outweigh the benefits of the limited attack surface and clean history.

Key Concerns

  • Unsanitized taint flows detected
  • Dangerous unserialize function used
  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
Vulnerabilities
None known

Advanced Plugin Search Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Advanced Plugin Search Code Analysis

Dangerous Functions
3
Raw SQL Queries
3
2 prepared
Unescaped Output
63
9 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$res = unserialize(wp_remote_retrieve_body($response));advanced-plugin-search.php:459
unserializereturn unserialize(wp_remote_retrieve_body($response));includes\class-klick-aps-db-operations.php:148
unserialize$results[$key]->icons = unserialize($icons);includes\class-klick-aps-db-operations.php:325

SQL Query Safety

40% prepared5 total queries

Output Escaping

13% escaped72 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
klick_adv_tab_render (advanced-plugin-search.php:158)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Advanced Plugin Search Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_klick_aps_ajaxadvanced-plugin-search.php:63
WordPress Hooks 11
actionadmin_menuadvanced-plugin-search.php:65
actionplugins_loadedadvanced-plugin-search.php:67
actionplugins_loadedadvanced-plugin-search.php:69
actionwp_footeradvanced-plugin-search.php:71
actionwp_headadvanced-plugin-search.php:73
filterinstall_plugins_tabsadvanced-plugin-search.php:75
filterinstall_themes_tabsadvanced-plugin-search.php:78
actioninstall_plugins_advadvanced-plugin-search.php:83
filterinstall_plugins_table_api_args_advadvanced-plugin-search.php:85
filterplugins_api_resultadvanced-plugin-search.php:87
actionall_admin_noticesincludes\class-klick-aps-dashboard.php:43
Maintenance & Trust

Advanced Plugin Search Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 5, 2017
PHP min version5.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Advanced Plugin Search Developer Profile

klickonit

17 plugins · 130 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Plugin Search

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/advanced-plugin-search/js/klick-aps.js/wp-content/plugins/advanced-plugin-search/css/klick-aps.css
Script Paths
/wp-content/plugins/advanced-plugin-search/js/klick-aps.js
Version Parameters
advanced-plugin-search/js/klick-aps.js?ver=advanced-plugin-search/css/klick-aps.css?ver=

HTML / DOM Fingerprints

CSS Classes
klick-logo-and-titleplugin-status-lebeldownloaded-plugin-status
HTML Comments
Copyright 2017 klick on it (http://klick-on-it.com)This program is free software; you can redistribute it and/or modifyThis program is distributed in the hope that it will be useful,You should have received a copy of the GNU General Public License+1 more
Data Attributes
id='plugin-db_create'id='plugin-filter'name='klick_aps_plugin_data'id='klick_aps_plugin_data'id='aps_create_db'name='aps_create_db'+1 more
JS Globals
var klick_aps_ajax_nonce
FAQ

Frequently Asked Questions about Advanced Plugin Search