
BizCalendar Web Security & Risk Analysis
wordpress.org/plugins/bizcalendar-webModul de programări online pentru clinicile medicale care folosesc BizMedica / Online appointments form for medical clinics using BizMedica software
Is BizCalendar Web Safe to Use in 2026?
Generally Safe
Score 96/100BizCalendar Web has a strong security track record. Known vulnerabilities have been patched promptly.
The bizcalendar-web plugin, version 1.1.0.62, exhibits a mixed security posture. While it demonstrates good practices in output escaping (99% properly escaped) and a high percentage of SQL queries using prepared statements (83%), significant concerns arise from its attack surface. A substantial 27 out of 34 identified entry points, primarily AJAX handlers, lack proper authentication checks, leaving them vulnerable to unauthorized access and potential exploitation. The presence of 3 unsanitized taint flows, although not rated as critical or high severity in the static analysis, warrants attention as they could potentially lead to security issues if exploited under specific conditions. The plugin's vulnerability history is also a notable concern, with 3 known CVEs, including one high-severity vulnerability, indicating a past susceptibility to common attack vectors like Remote File Inclusion, SQL Injection, and Cross-site Scripting. Although currently no unpatched vulnerabilities exist, this history suggests a recurring need for vigilance and prompt patching by users. The plugin's strengths lie in its code hygiene regarding output and prepared SQL statements, but the exposed attack surface and historical vulnerability patterns necessitate a cautious approach.
Key Concerns
- Significant attack surface without auth checks (AJAX)
- Taint flows with unsanitized paths
- History of 1 high severity CVE
- History of 2 medium severity CVEs
- Bundled library (Select2) - potential for outdatedness
BizCalendar Web Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
BizCalendar Web <= 1.1.0.53 - Authenticated (Contributor+) Local File Inclusion
bizcalendar-web <= 1.1.0.34 - Authenticated (Administrator+) SQL Injection
BizCalendar Web <= 1.1.0.25 - Reflected Cross-Site Scripting via 'tab'
BizCalendar Web Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
BizCalendar Web Attack Surface
AJAX Handlers 27
Shortcodes 7
WordPress Hooks 16
Maintenance & Trust
BizCalendar Web Maintenance & Trust
Maintenance Signals
Community Trust
BizCalendar Web Alternatives
No alternatives data available yet.
BizCalendar Web Developer Profile
1 plugin · 20 total installs
How We Detect BizCalendar Web
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/bizcalendar-web/js/main.js/wp-content/plugins/bizcalendar-web/js/admin.js/wp-content/plugins/bizcalendar-web/css/style.css/wp-content/plugins/bizcalendar-web/css/bootstrap.min.css/wp-content/plugins/bizcalendar-web/css/bootstrap-datetimepicker.min.css/wp-content/plugins/bizcalendar-web/css/font-awesome.min.css/wp-content/plugins/bizcalendar-web/css/daterangepicker.css/wp-content/plugins/bizcalendar-web/js/moment.min.js+13 more/wp-content/plugins/bizcalendar-web/js/main.js/wp-content/plugins/bizcalendar-web/js/admin.jsbizcalendar-web/style.css?ver=bizcalendar-web/js/main.js?ver=HTML / DOM Fingerprints
setrio-bizcal-booking-formbizcal-calendar-wrap<!-- BizCalendar Web Booking Form --><!-- BizCalendar Web Calendar -->data-bizcal-actiondata-bizcal-postidbizcal_ajax_objectsetrio_bizcal_config/wp-json/bizcalendar-web/v1/specialities/wp-json/bizcalendar-web/v1/locations/wp-json/bizcalendar-web/v1/services/wp-json/bizcalendar-web/v1/physicians/wp-json/bizcalendar-web/v1/prices/wp-json/bizcalendar-web/v1/payment-types/wp-json/bizcalendar-web/v1/allowed-payment-types/wp-json/bizcalendar-web/v1/availability/wp-json/bizcalendar-web/v1/register-appointment/wp-json/bizcalendar-web/v1/price-for-service[bizcal_booking_form[bizcal_calendar