All In One Must Have Security & Risk Analysis

wordpress.org/plugins/all-in-one-must-have

Plugins synthesize the functions useful needed on a website to help you optimize your website and support you manager, security defence, seo website b …

20 active installs v1.3 PHP + WP 3.0.1+ Updated Unknown
auto-thumbnaildefencemust-have-pluginssecurityuseful
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is All In One Must Have Safe to Use in 2026?

Generally Safe

Score 100/100

All In One Must Have has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "all-in-one-must-have" plugin v1.3 presents a significant security risk due to its lack of proper authentication and sanitization. The static analysis reveals a single AJAX handler that is completely unprotected, creating a direct entry point for attackers. Furthermore, the taint analysis indicates three high-severity flows with unsanitized paths, suggesting potential vulnerabilities like Cross-Site Scripting (XSS) or Remote Code Execution (RCE) if these paths can be influenced by user input.

The absence of any recorded vulnerabilities in its history might give a false sense of security. However, this could also indicate a lack of comprehensive security auditing or that existing vulnerabilities have simply not been discovered or reported. The critical findings in the code analysis, particularly the unprotected AJAX handler and the high-severity unsanitized taint flows, strongly outweigh the clean vulnerability history. The plugin also exhibits poor output escaping practices, with 0% of outputs being properly escaped, further increasing the risk of XSS vulnerabilities.

In conclusion, while the plugin has no known CVEs, its current state is concerning. The presence of an unprotected entry point and multiple high-severity taint flows, coupled with widespread output escaping issues, makes it a prime target. Mitigation strategies should focus on securing the AJAX handler, sanitizing all input that influences the identified taint flows, and implementing proper output escaping mechanisms throughout the plugin. Until these issues are addressed, the plugin should be considered a high-risk component.

Key Concerns

  • Unprotected AJAX handler
  • High severity unsanitized taint flows (3)
  • 0% properly escaped outputs
  • No nonce checks
  • No capability checks
  • SQL queries with low prepared statement usage (20%)
Vulnerabilities
None known

All In One Must Have Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

All In One Must Have Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
1 prepared
Unescaped Output
159
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
20
External Requests
0
Bundled Libraries
0

SQL Query Safety

20% prepared5 total queries

Output Escaping

0% escaped159 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
<change-prefix> (inc\change-prefix.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

All In One Must Have Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_my_actionindex.php:822
WordPress Hooks 40
actionadmin_enqueue_scriptsindex.php:30
actionadmin_initindex.php:185
actionadmin_menuindex.php:187
actionadmin_bar_menuindex.php:200
filtersanitize_file_nameindex.php:640
filterjpeg_qualityindex.php:643
actionsave_postindex.php:713
actionwp_loadedindex.php:770
actionwp_enqueue_scriptsindex.php:802
actionadmin_enqueue_scriptsindex.php:820
filternav_menu_css_classindex.php:864
filternav_menu_item_idindex.php:865
filterpage_css_classindex.php:866
actionadmin_initindex.php:886
filtercomments_openindex.php:891
filterpings_openindex.php:892
filtercomments_arrayindex.php:898
actionadmin_menuindex.php:903
actionadmin_initindex.php:911
actionadmin_initindex.php:916
actioninitindex.php:923
actioninitindex.php:935
filterxmlrpc_enabledindex.php:964
actioninitindex.php:984
actionwp_footerindex.php:1014
actionwp_enqueue_scriptsindex.php:1024
actionwp_footerindex.php:1060
actionwp_footerindex.php:1061
actionwp_footerindex.php:1062
actionafter_setup_themeindex.php:1066
actionwp_enqueue_scriptsindex.php:1068
filterscript_loader_tagindex.php:1085
filterscript_loader_tagindex.php:1102
actionwp_loadedindex.php:1109
actionwp_loginindex.php:1140
actionwp_logoutindex.php:1143
actionedit_postindex.php:1195
filtershow_admin_barindex.php:1200
actionafter_setup_themeindex.php:1201
actioninitindex.php:1227
Maintenance & Trust

All In One Must Have Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

All In One Must Have Developer Profile

minhlinh100

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect All In One Must Have

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/all-in-one-must-have/css/admin.css
Script Paths
/wp-content/plugins/all-in-one-must-have/js/admin.js
Version Parameters
all-in-one-must-have/css/admin.css?ver=all-in-one-must-have/js/admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about All In One Must Have