BeatGig WordPress Plugin Security & Risk Analysis

wordpress.org/plugins/beatgig-calendar-embed

BeatGig's event calendar is a modern, beautiful calendar that embeds directly onto your website. When you book new shows on BeatGig, your website …

10 active installs v0.2 PHP + WP 3.1+ Updated Unknown
calendarcalendarseventevent-calendarevents-calendar
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is BeatGig WordPress Plugin Safe to Use in 2026?

Generally Safe

Score 100/100

BeatGig WordPress Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The beatgig-calendar-embed plugin version 0.2 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, external HTTP requests, and SQL queries not using prepared statements are all positive indicators. Furthermore, the plugin demonstrates good output escaping practices and no recorded vulnerabilities in its history, suggesting a history of secure development. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, further contributes to its secure design.

However, a significant concern arises from the complete lack of nonce checks and capability checks. While the current version has no unprotected entry points, the absence of these fundamental security mechanisms means that if any new entry points are introduced or existing ones are modified without proper authentication and authorization, the plugin would be highly vulnerable to various attacks such as CSRF or privilege escalation. The taint analysis results are also limited, showing zero flows analyzed, which might indicate the analysis tool's limitations or a very simple codebase, but it doesn't provide assurance of complete safety against more complex injection vulnerabilities.

In conclusion, beatgig-calendar-embed v0.2 is a well-developed plugin with many security best practices implemented. Its vulnerability history is a strong positive. The primary weakness lies in the fundamental lack of nonce and capability checks, which, if not addressed in future updates, could become a critical security flaw. The limited taint analysis also warrants a cautious approach, as it might not have identified all potential risks.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Limited taint analysis scope
Vulnerabilities
None known

BeatGig WordPress Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

BeatGig WordPress Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

BeatGig WordPress Plugin Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[beatgig] embed.php:35
Maintenance & Trust

BeatGig WordPress Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.0
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

BeatGig WordPress Plugin Developer Profile

fernandorojo

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BeatGig WordPress Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://beatgig.com/embed/apply-buttonhttps://beatgig.com/iframe/venue-calendar

HTML / DOM Fingerprints

Data Attributes
data-beatgig-embeddata-beatgig-venue-slug
Shortcode Output
<script async src="https://beatgig.com/iframe/venue-calendar"<script async src="https://beatgig.com/embed/apply-button"
FAQ

Frequently Asked Questions about BeatGig WordPress Plugin