BrandBees Malware Guardian Security & Risk Analysis

wordpress.org/plugins/brandbees-malware-guardian

Scans WordPress files and database for malware indicators with practical cleanup workflows and backups.

0 active installs v1.0.0 PHP 7.4+ WP 5.8+ Updated Apr 16, 2026
malwaremalware-detectionscannersecuritywordpress-security
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is BrandBees Malware Guardian Safe to Use in 2026?

Generally Safe

Score 100/100

BrandBees Malware Guardian has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "brandbees-malware-guardian" v1.0.0 plugin exhibits a generally positive security posture based on the provided static analysis. The absence of any known CVEs and a strong adherence to secure coding practices like prepared statements for SQL queries and comprehensive output escaping (99%) are commendable. Furthermore, the plugin demonstrates good security awareness by implementing nonce checks and capability checks on all its identified entry points, preventing potential Cross-Site Request Forgery (CSRF) and privilege escalation attacks.

However, a single instance of the `unserialize()` function raises a significant concern. If the data passed to this function is not strictly controlled and validated from a trusted source, it could be susceptible to Object Unserialization Vulnerabilities (PHP Object Injection), allowing an attacker to potentially execute arbitrary code. While the taint analysis reported no specific flows with unsanitized paths, the mere presence of `unserialize()` without further context regarding its usage warrants caution. The plugin also makes 14 external HTTP requests, which, if not handled securely, could introduce risks like Server-Side Request Forgery (SSRF) or data leakage, although no specific indicators for these are present in the provided data.

In conclusion, the plugin is built on a solid foundation of secure coding principles, and its vulnerability history is clean, suggesting a responsible development approach. The primary area of concern lies with the `unserialize()` function, which requires careful review of its implementation to ensure data integrity and prevent potential injection attacks. The external HTTP requests also represent a potential, albeit unconfirmed, attack vector that should be monitored.

Key Concerns

  • Use of unserialize() function
Vulnerabilities
None known

BrandBees Malware Guardian Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

BrandBees Malware Guardian Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

BrandBees Malware Guardian Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
109 prepared
Unescaped Output
3
509 escaped
Nonce Checks
5
Capability Checks
5
File Operations
4
External Requests
14
Bundled Libraries
0

Dangerous Functions Found

unserialize$un = @unserialize( $value );includes/scanner/class-database-scanner.php:1004

SQL Query Safety

100% prepared109 total queries

Output Escaping

99% escaped512 total outputs
Attack Surface

BrandBees Malware Guardian Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_bbmg_test_malware_apisincludes/scanner/class-threat-settings.php:63
authwp_ajax_bbmg_update_phishtank_dbincludes/scanner/class-threat-settings.php:64
authwp_ajax_bbmg_clear_malware_cacheincludes/scanner/class-threat-settings.php:65
WordPress Hooks 9
filtercron_schedulesbrandbees-malware-guardian.php:150
actionplugins_loadedbrandbees-malware-guardian.php:210
actionbbmg_run_scan_asyncbrandbees-malware-guardian.php:237
actionrest_api_initincludes/class-rest-api.php:21
actionadmin_menuincludes/class-security-admin.php:42
actionadmin_enqueue_scriptsincludes/class-security-admin.php:43
actionadmin_initincludes/class-settings.php:63
filtercron_schedulesincludes/scanner/class-scan-scheduler.php:66
actionadmin_initincludes/scanner/class-threat-settings.php:62
Maintenance & Trust

BrandBees Malware Guardian Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 16, 2026
PHP min version7.4
Downloads23

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

BrandBees Malware Guardian Developer Profile

BrandBees

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BrandBees Malware Guardian

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/brandbees-malware-guardian/assets/css/admin.css/wp-content/plugins/brandbees-malware-guardian/assets/js/admin.js/wp-content/plugins/brandbees-malware-guardian/assets/js/vendor/chart.js
Script Paths
/wp-content/plugins/brandbees-malware-guardian/assets/js/admin.js/wp-content/plugins/brandbees-malware-guardian/assets/js/vendor/chart.js
Version Parameters
brandbees-malware-guardian/assets/css/admin.css?ver=brandbees-malware-guardian/assets/js/admin.js?ver=brandbees-malware-guardian/assets/js/vendor/chart.js?ver=

HTML / DOM Fingerprints

CSS Classes
bbmg-malware-scan-resultsbbmg-scan-status-indicatorbbmg-scan-summarybbmg-threat-list-itembbmg-threat-detailsbbmg-threat-actionsbbmg-scan-control-buttonsbbmg-scan-progress-bar+1 more
HTML Comments
<!-- BrandBees Malware Guardian Admin Page --><!-- Scan Results Section --><!-- Scan Summary Section --><!-- Threat List Section -->+4 more
Data Attributes
data-scan-iddata-scan-statusdata-threat-iddata-action-type
JS Globals
bbmg_admin_params
REST Endpoints
/wp-json/bbmg/v1/scan/wp-json/bbmg/v1/threats/wp-json/bbmg/v1/settings
FAQ

Frequently Asked Questions about BrandBees Malware Guardian