AJAXify FAQ-Tastic Security & Risk Analysis

wordpress.org/plugins/ajaxify-faqtastic

Used to add AJAX open/close effects to the FAQ-Tastic WordPress plugin.

20 active installs v1.5 PHP + WP 2.5+ Updated Jun 20, 2009
formattinglinkspagepostposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AJAXify FAQ-Tastic Safe to Use in 2026?

Generally Safe

Score 85/100

AJAXify FAQ-Tastic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'ajaxify-faqtastic' v1.5 plugin exhibits a strong security posture. The absence of any identified AJAX handlers, REST API routes, shortcodes, cron events, or file operations significantly limits its attack surface. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries are prepared, and all outputs are properly escaped. There are no observed external HTTP requests or bundled libraries that might introduce vulnerabilities.

The taint analysis also reveals no critical or high severity issues, with zero flows containing unsanitized paths. The vulnerability history is completely clean, with no recorded CVEs, indicating a track record of secure development or effective patching by the maintainers. The plugin demonstrates excellent adherence to secure coding practices in the analyzed areas.

While the current data presents a very positive security outlook, it's important to note that the analysis identified zero capability checks and zero nonce checks. Although the attack surface is currently zero, if new entry points were introduced without these crucial authentication and authorization mechanisms, it could pose a significant risk. However, based solely on the data provided, the plugin appears to be very secure.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

AJAXify FAQ-Tastic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

AJAXify FAQ-Tastic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

AJAXify FAQ-Tastic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headajaxify-faqtastic.php:35
actionwp_headajaxify-faqtastic.php:36
Maintenance & Trust

AJAXify FAQ-Tastic Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedJun 20, 2009
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

AJAXify FAQ-Tastic Developer Profile

Matt Martz

12 plugins · 5K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AJAXify FAQ-Tastic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ajaxify-faqtastic/css/ajaxify-faqtastic.css/wp-content/plugins/ajaxify-faqtastic/js/ajaxify-faqtastic.js
Script Paths
/wp-content/plugins/ajaxify-faqtastic/js/ajaxify-faqtastic.js
Version Parameters
ajaxify-faqtastic/css/ajaxify-faqtastic.css?ver=1.5ajaxify-faqtastic/js/ajaxify-faqtastic.js?ver=1.5

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about AJAXify FAQ-Tastic