Auction Feed Security & Risk Analysis

wordpress.org/plugins/auction-feed

Display your eBay items on your own website allowing visitors to search your products and buy them easily. Choose options and styles to suit your Wor …

100 active installs v1.1.4 PHP 7.0+ WP 5.5.0+ Updated Mar 11, 2026
auctionebayfeed
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is Auction Feed Safe to Use in 2026?

Mostly Safe

Score 78/100

Auction Feed is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Sep 22, 2025Updated 24d ago
Risk Assessment

The 'auction-feed' plugin version 1.1.4 exhibits a mixed security posture. On the positive side, the static analysis reveals a small attack surface, with only one shortcode as an entry point and no unprotected AJAX handlers or REST API routes. The plugin also demonstrates good practices in SQL query handling, with a high percentage using prepared statements, and includes capability checks and a nonce check for its single entry point. However, the presence of five dangerous `unserialize` calls is a significant concern, as deserialization vulnerabilities can lead to remote code execution if not handled with extreme care and robust input validation. While taint analysis did not reveal any immediate unsanitized flows, the potential for misuse of `unserialize` remains a latent risk.

The vulnerability history is a notable weakness. The plugin has one known medium severity CVE, which is currently unpatched. The fact that the last reported vulnerability was in September 2025 (in the future, likely a typo and intended to be past) and that it was a Cross-Site Request Forgery (CSRF) suggests a pattern of past security issues that have not been fully addressed. This history, combined with the `unserialize` function, indicates a need for more thorough security auditing and prompt patching of known vulnerabilities.

In conclusion, 'auction-feed' v1.1.4 has strengths in its limited attack surface and some secure coding practices like prepared statements. Nevertheless, the use of `unserialize` and the existence of an unpatched medium severity CVE present clear and present risks. These factors necessitate caution and prompt remediation to improve the plugin's overall security.

Key Concerns

  • Unpatched medium severity CVE
  • Dangerous function: unserialize (5 calls)
  • Output escaping: 56% properly escaped
Vulnerabilities
1

Auction Feed Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58671medium · 4.3Cross-Site Request Forgery (CSRF)

Auction Feed <= 1.1.3 - Cross-Site Request Forgery

Sep 22, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Auction Feed Code Analysis

Dangerous Functions
5
Raw SQL Queries
4
16 prepared
Unescaped Output
26
33 escaped
Nonce Checks
1
Capability Checks
5
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$feeds = unserialize($results['option_value']);auction-feed.php:83
unserialize$feeds = unserialize($result);auction-feed.php:179
unserialize$feeds = unserialize($results['option_value']);auction-feed.php:646
unserialize$feeds = unserialize($result);auction-feed.php:708
unserialize$feeds = unserialize($result);auction-feed.php:814

SQL Query Safety

80% prepared20 total queries

Output Escaping

56% escaped59 total outputs
Data Flows
All sanitized

Data Flow Analysis

4 flows
auction_feed_feed (auction-feed.php:116)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Auction Feed Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[auctionfeed] auction-feed.php:21
WordPress Hooks 2
actionadmin_menuauction-feed.php:19
actionadmin_enqueue_scriptsauction-feed.php:20
Maintenance & Trust

Auction Feed Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 11, 2026
PHP min version7.0
Downloads3K

Community Trust

Rating92/100
Number of ratings8
Active installs100
Developer Profile

Auction Feed Developer Profile

morganrichards

1 plugin · 100 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auction Feed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auction-feed/css/style.css/wp-content/plugins/auction-feed/js/jquery.validate.min.js/wp-content/plugins/auction-feed/js/ajax-calls.js/wp-content/plugins/auction-feed/js/setup-feed.js
Script Paths
/wp-content/plugins/auction-feed/js/jquery.validate.min.js/wp-content/plugins/auction-feed/js/ajax-calls.js/wp-content/plugins/auction-feed/js/setup-feed.js
Version Parameters
auction-feed/css/style.css?ver=auction-feed/js/jquery.validate.min.js?ver=auction-feed/js/ajax-calls.js?ver=auction-feed/js/setup-feed.js?ver=

HTML / DOM Fingerprints

CSS Classes
auction-feed
Data Attributes
data-href
Shortcode Output
[auctionfeed id="
FAQ

Frequently Asked Questions about Auction Feed