Aistore incident reportings Security & Risk Analysis

wordpress.org/plugins/aistore-incidents-updates

In order to build a trust we should provide details about the website downtime etc to our all customers. This plugin provide easy process to manage th …

0 active installs v4.1.1 PHP + WP + Updated Jan 26, 2020
incidentstatus-update
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Aistore incident reportings Safe to Use in 2026?

Generally Safe

Score 85/100

Aistore incident reportings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "aistore-incidents-updates" plugin version 4.1.1 exhibits a generally strong security posture based on the provided static analysis. The code demonstrates excellent adherence to secure coding practices, with no identified dangerous functions, SQL queries utilizing prepared statements exclusively, and all output being properly escaped. Crucially, there are no identified taint flows, external HTTP requests, or file operations, significantly reducing the plugin's attack surface in these common vulnerability areas. The absence of any known CVEs or past vulnerabilities further reinforces this positive assessment, suggesting a well-maintained and secure codebase.

However, a notable area of concern arises from the lack of explicit nonce and capability checks across the identified entry points. While the analysis indicates zero unprotected entry points, the reporting of '0 nonce checks' and '0 capability checks' suggests that the existing entry points might be relying on WordPress core's default permission checks, or that the static analysis tool may have limitations in identifying these checks in certain contexts. This lack of explicit, plugin-specific security checks, even with a limited attack surface, represents a potential weakness that could be exploited if an attacker finds a way to bypass WordPress's core protections or if the analysis is not capturing all relevant checks.

In conclusion, the plugin is strong in its fundamental secure coding and lack of historical issues. The primary weakness lies in the reported absence of specific nonce and capability checks, which, while not demonstrably leading to vulnerabilities in this version according to the provided data, is a best practice that would further harden the plugin. Future versions should aim to implement these checks explicitly for enhanced security.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Aistore incident reportings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Aistore incident reportings Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Aistore incident reportings Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[aistore_incidents] index.php:98
WordPress Hooks 1
actioninitindex.php:76
Maintenance & Trust

Aistore incident reportings Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 26, 2020
PHP min version
Downloads981

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Aistore incident reportings Developer Profile

susheelhbti

14 plugins · 40 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Aistore incident reportings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/aistore_incident
Shortcode Output
<h2><p><small><hr/>
FAQ

Frequently Asked Questions about Aistore incident reportings