
Attesa Extra Security & Risk Analysis
wordpress.org/plugins/attesa-extraAdd extra features to Attesa WordPress theme
Is Attesa Extra Safe to Use in 2026?
Generally Safe
Score 96/100Attesa Extra has a strong security track record. Known vulnerabilities have been patched promptly.
The "attesa-extra" plugin v1.4.8 presents a mixed security posture. On the positive side, the static analysis indicates a relatively clean codebase with all identified entry points (AJAX handlers, REST API routes, shortcodes) having authorization checks. The plugin also demonstrates good practice by using prepared statements for all SQL queries and a high percentage of properly escaped output. The absence of any critical or high severity taint flows further suggests a level of security consciousness in its development.
However, several areas warrant caution. The presence of the `unserialize` function is a significant concern, as it can be exploited for remote code execution if an attacker can control the serialized data. While the current static analysis doesn't explicitly reveal a direct vulnerability related to it, it remains a high-risk function that requires vigilant sanitization of its input. Furthermore, the plugin has a history of three medium severity vulnerabilities, specifically Cross-site Scripting and Authorization Bypass. The fact that the last vulnerability was recorded in 2025 suggests that while no CVEs are currently unpatched, the plugin has had a past pattern of exploitable flaws, and continued vigilance regarding updates and future patches is essential.
Overall, "attesa-extra" v1.4.8 shows strengths in its use of prepared statements and authorization checks on entry points. However, the presence of `unserialize` and its historical vulnerability record, particularly medium severity issues, necessitates a cautious approach. While the current version appears to have addressed past CVEs, the potential for exploitation via `unserialize` and the need for ongoing monitoring of its security track record are the primary weaknesses.
Key Concerns
- Presence of unserialize function
- Medium severity vulnerability history (3 total)
Attesa Extra Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Attesa Extra <= 1.4.7 - Authenticated (Contributor+) Stored Cross-Site Scripting
Attesa Extra <= 1.4.2 - Authenticated (Contributor+) Post Disclosure
Attesa Extra <= 1.3.9 - Authenticated (Contributor+) Stored Cross-Site Scripting
Attesa Extra Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Attesa Extra Attack Surface
AJAX Handlers 7
Shortcodes 5
WordPress Hooks 150
Maintenance & Trust
Attesa Extra Maintenance & Trust
Maintenance Signals
Community Trust
Attesa Extra Alternatives
Ocean Extra
ocean-extra
Ocean Extra adds extra features and flexibility to the OceanWP theme for a turbocharged experience.
CMB2
cmb2
CMB2 is a metabox, custom fields, and forms library for WordPress that will blow your mind.
PT Theme Addon
pt-theme-addon
Plugin to add team, testimonial portfolio and clients custom post type. Each post type has its widget and shortcode to use in theme.
Sweet Custom Dashboard
sweet-custom-dashboard
A nice plugin to start creating your own custom WordPress dashboard.
CMB2 Admin Extension
cmb2-admin-extension
Create and manage CMB2 meta boxes from the WordPress admin without writing code.
Attesa Extra Developer Profile
25 plugins · 22K total installs
How We Detect Attesa Extra
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/attesa-extra/widgets/social-buttons.php/wp-content/plugins/attesa-extra/widgets/latest-comments.php/wp-content/plugins/attesa-extra/widgets/random-post.php/wp-content/plugins/attesa-extra/widgets/recent-post.php/wp-content/plugins/attesa-extra/metabox/shortcodes.php/wp-content/plugins/attesa-extra/metabox/functions.php/wp-content/plugins/attesa-extra/metabox/hooks.php/wp-content/plugins/attesa-extra/customizer/functions.php+9 moreHTML / DOM Fingerprints
attesa-extra