Bookwize Form Security & Risk Analysis

wordpress.org/plugins/bookwize-booking-form

Connect easily Bookwize Hotel Booking System with your WordPress website and let visitors search availability and rates directly from your website.

10 active installs v1.9.7 PHP + WP 4.0.1+ Updated Jan 10, 2020
bookingbooking-enginebooking-formbooking-systembookwize
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bookwize Form Safe to Use in 2026?

Generally Safe

Score 85/100

Bookwize Form has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The bookwize-booking-form plugin version 1.9.7 exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) and the plugin doesn't perform file operations or external HTTP requests. The total attack surface is minimal, with only one shortcode identified and no unprotected entry points based on the static analysis. However, significant concerns arise from the code analysis. A substantial portion of output (94%) is not properly escaped, presenting a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, 50% of SQL queries are not using prepared statements, which could lead to SQL injection flaws. The taint analysis reveals two flows with unsanitized paths, although they are not flagged as critical or high severity. The absence of nonce checks and a concerningly low capability check count also contribute to the overall risk.

Key Concerns

  • High percentage of unescaped output
  • Raw SQL queries without prepared statements
  • Taint flows with unsanitized paths
  • No nonce checks detected
  • Low number of capability checks
Vulnerabilities
None known

Bookwize Form Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Bookwize Form Release Timeline

v1.9.6
v1.9.5
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.8
v1.7
v1.6
v1.5
v1.4
v1.3
v1.2
v1.1
Code Analysis
Analyzed Apr 16, 2026

Bookwize Form Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
46
3 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

6% escaped49 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
http_response_code (functions.php:4)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Bookwize Form Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[bookwizeform] includes/class-bookwize-form-shortcodes.php:17
WordPress Hooks 17
actionwidgets_initadmin/class-bookwize-form-admin.php:58
actionplugins_loadedbookwize-form.php:89
actionadmin_enqueue_scriptsincludes/class-bookwize-form-admin.php:110
actionwp_headincludes/class-bookwize-form-public.php:66
actionadmin_noticesincludes/class-bookwize-form-settings.php:157
actionadmin_noticesincludes/class-bookwize-form-settings.php:166
actioninitincludes/class-bookwize-form-shortcodes.php:9
actionplugins_loadedincludes/class-bookwize-form.php:183
actionadmin_initincludes/class-bookwize-form.php:201
actionadmin_initincludes/class-bookwize-form.php:202
actionadmin_menuincludes/class-bookwize-form.php:203
actionadmin_enqueue_scriptsincludes/class-bookwize-form.php:205
actionadmin_enqueue_scriptsincludes/class-bookwize-form.php:206
actionwp_enqueue_scriptsincludes/class-bookwize-form.php:222
actionwp_enqueue_scriptsincludes/class-bookwize-form.php:223
actioninitincludes/class-bookwize-form.php:226
actionwp_headpublic/class-bookwize-form-public.php:66
Maintenance & Trust

Bookwize Form Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJan 10, 2020
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Bookwize Form Developer Profile

Bookwize

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bookwize Form

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bookwize-booking-form/admin/css/bookwize-form-admin.css/wp-content/plugins/bookwize-booking-form/js/bookwize-form-admin.js
Script Paths
wp-color-picker-script.js
Version Parameters
bookwize-booking-form/js/bookwize-form-admin.js?ver=wp-color-picker-script.js?ver=

HTML / DOM Fingerprints

CSS Classes
bookwize-formbookwize-calendarbookwize-date-pickerbookwize-time-pickerbookwize-field-wrapper
HTML Comments
<!-- BEGIN: Bookwize Booking Form --><!-- END: Bookwize Booking Form --><!-- Bookwize Date Picker --><!-- Bookwize Time Picker -->+1 more
Data Attributes
data-bwf-actiondata-bwf-form-iddata-bwf-date-formatdata-bwf-time-format
JS Globals
BookwizeFormbookwize_admin_params
REST Endpoints
/wp-json/bookwize/v1/booking/wp-json/bookwize/v1/availability
Shortcode Output
[bookwize_booking_form][bookwize_booking_form id=1]
FAQ

Frequently Asked Questions about Bookwize Form