Cyoud AIO Security & Risk Analysis

wordpress.org/plugins/cyoud-aio

Extend, speed up and customize your Wordpress site with Cyoud AIO.

0 active installs v2.0 PHP + WP 4.7+ Updated Dec 16, 2018
related-postsite-decorationsocial-iconview-post-count
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cyoud AIO Safe to Use in 2026?

Generally Safe

Score 85/100

Cyoud AIO has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "cyoud-aio" plugin version 2.0 presents a significant security risk primarily due to its unprotected AJAX endpoints. While the plugin avoids dangerous functions, raw SQL, file operations, and external HTTP requests, the absence of authentication checks on both AJAX handlers creates a wide attack surface. This means any unauthenticated user could potentially interact with these endpoints, leading to unpredictable behavior or vulnerabilities if the functionality is sensitive. The limited output escaping further exacerbates this risk, as reflected by the 29% proper escaping rate, suggesting that sensitive data might be exposed to Cross-Site Scripting (XSS) attacks through these unprotected entry points. The taint analysis, while not indicating critical or high severity issues, does show flows with unsanitized paths, which in conjunction with unprotected AJAX handlers, can be a pathway for exploitation.

The plugin's vulnerability history is a positive indicator, showing zero recorded CVEs. This suggests that, historically, the plugin has been relatively secure or that vulnerabilities have been promptly addressed. However, the current static analysis findings, particularly the unprotected AJAX handlers and insufficient output escaping, should not be overlooked. The absence of nonce checks and capability checks on these entry points is a critical oversight. In conclusion, while the plugin demonstrates good practices in areas like SQL query preparation and avoiding dangerous functions, the severe lack of authentication and authorization on its primary entry points, combined with poor output sanitization, makes it a high-risk component that requires immediate attention.

Key Concerns

  • 2 unprotected AJAX handlers
  • Insufficient output escaping (29% proper)
  • 2 flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Cyoud AIO Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cyoud AIO Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped14 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
caio_saveOption (autoload.php:23)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Cyoud AIO Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_saveOptionautoload.php:22
authwp_ajax_saveAoptionautoload.php:29
WordPress Hooks 20
actionadmin_menuapp.php:33
actionwp_default_scriptsapp.php:57
filtermce_buttons_3app.php:86
filterthe_contentapp.php:143
filterthe_contentapp.php:213
actionwp_enqueue_scriptsapp.php:240
actionwp_footerapp.php:241
actioninitapp.php:298
filterthe_contentapp.php:354
actionwp_enqueue_scriptsapp.php:378
actionwp_footerapp.php:379
filterstyle_loader_srcapp.php:401
filterscript_loader_srcapp.php:402
filtercomment_form_default_fieldsapp.php:423
actionwp_headapp.php:446
actionwp_headapp.php:482
actionwp_headapp.php:504
actionwp_enqueue_scriptsapp.php:527
actionwp_enqueue_scriptsautoload.php:15
actionadmin_enqueue_scriptsautoload.php:16
Maintenance & Trust

Cyoud AIO Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedDec 16, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Cyoud AIO Developer Profile

cyoud

2 plugins · 0 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cyoud AIO

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cyoud-aio/css/style.css/wp-content/plugins/cyoud-aio/css/bootstrap.min.css/wp-content/plugins/cyoud-aio/css/cyoud-aio.css
Script Paths
/wp-content/plugins/cyoud-aio/js/script.js/wp-content/plugins/cyoud-aio/js/bootstrap.min.js/wp-content/plugins/cyoud-aio/js/custom.js
Version Parameters
cyoud-aio/style.css?ver=cyoud-aio/script.js?ver=cyoud-aio/bootstrap.min.css?ver=cyoud-aio/bootstrap.min.js?ver=cyoud-aio/custom.js?ver=

HTML / DOM Fingerprints

CSS Classes
caio_social_iconcaio_si_viewcaio_si_facebookcaio_si_googlecaio_si_twittercaio_si_linkedincaio_si_whatsapp
Data Attributes
data-target="#cyoud_donate"data-toggle="modal"
JS Globals
cyoud_donate_data
REST Endpoints
/wp-json/cyoud-aio/v1/settings
Shortcode Output
[cyoud-aio-donate-button]
FAQ

Frequently Asked Questions about Cyoud AIO