Ajaxize Security & Risk Analysis

wordpress.org/plugins/ajaxize

Ajaxize will allow you to ajaxize almost any php function on your site.

30 active installs v1.4.3 PHP + WP 3.1+ Updated Jun 19, 2016
ajaxcachedynamicjavascript
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ajaxize Safe to Use in 2026?

Generally Safe

Score 85/100

Ajaxize has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "ajaxize" v1.4.3 plugin presents a mixed security posture. On one hand, the static analysis indicates a very limited attack surface with no discovered AJAX handlers, REST API routes, shortcodes, or cron events that are accessible without proper authentication. This is a significant positive, suggesting that direct entry points into the plugin's functionality are well-protected or non-existent.

However, the code analysis reveals several concerning signals. The presence of the `create_function` dangerous function, even if not directly exploitable in this version due to other protections, is a red flag. More importantly, 100% of outputs are not properly escaped, which presents a significant Cross-Site Scripting (XSS) risk. Any data processed and rendered by the plugin could potentially be injected with malicious scripts if it originates from an untrusted source. While taint analysis shows no unsanitized flows, this is often due to a lack of exploitable entry points, rather than robust sanitization practices. The absence of capability checks on any potential code paths is also a weakness.

The plugin's vulnerability history is clean, with no known CVEs recorded. This, combined with the limited attack surface, suggests that in its current state, it may not have been a target or may have had its previous issues addressed. Nevertheless, the identified code-level weaknesses, particularly the unescaped output, represent inherent risks that could be exploited if new entry points or data sources are introduced in future updates or through interactions with other plugins.

Key Concerns

  • Outputs not properly escaped
  • Dangerous function used (create_function)
  • No capability checks found
Vulnerabilities
None known

Ajaxize Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ajaxize Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_settings_section('plugin_main', 'Security Settings', create_function('',''), 'ajaxize_this');ajaxize_admin.php:85
create_functionadd_action('admin_notices', create_function('', 'echo \'<div id="message" class="error"><p>Fuction najaxize_admin.php:147
create_functionadd_action('admin_notices', create_function('', 'echo \'<div id="message" class="error"><p>Invalid fajaxize_admin.php:152

Output Escaping

0% escaped4 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
ajaxize_request_handler (ajaxize.php:179)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Ajaxize Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initajaxize.php:156
actiontemplate_redirectajaxize.php:157
actionwp_print_scriptsajaxize.php:158
actionadmin_menuajaxize_admin.php:7
actionadmin_initajaxize_admin.php:9
actionadmin_noticesajaxize_admin.php:147
actionadmin_noticesajaxize_admin.php:152
filtercontextual_helpajaxize_admin.php:157
Maintenance & Trust

Ajaxize Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJun 19, 2016
PHP min version
Downloads17K

Community Trust

Rating90/100
Number of ratings4
Active installs30
Developer Profile

Ajaxize Developer Profile

yoav.aner

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ajaxize

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ajaxize/ajaxize.js/wp-content/plugins/ajaxize/ajaxize.css
Script Paths
/wp-content/plugins/ajaxize/ajaxize.js
Version Parameters
ajaxize.js?ver=ajaxize.css?ver=

HTML / DOM Fingerprints

Data Attributes
data-ajaxize-id
JS Globals
ajaxizeParams
Shortcode Output
<div class="ajaxize_this" id="ajaxize_this:
FAQ

Frequently Asked Questions about Ajaxize