DietMaster Integration Security & Risk Analysis

wordpress.org/plugins/dietmaster-pro-nutrition

Authenticated users can seamlessly access DietMaster Pro Nutrition Software.

50 active installs v1.3.0 PHP + WP 3.8+ Updated Dec 5, 2015
dietmasterdietmaster-profitnessnutrition-softwareonline-nutrition
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DietMaster Integration Safe to Use in 2026?

Generally Safe

Score 85/100

DietMaster Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The dietmaster-pro-nutrition plugin v1.3.0 exhibits a mixed security posture. On the positive side, there are no known CVEs associated with this plugin, and its attack surface is relatively small with no unprotected entry points identified. The plugin also includes some nonce checks, which is a good practice for preventing certain types of attacks. However, significant concerns arise from the static code analysis. The complete absence of prepared statements for all SQL queries is a major weakness, leaving the plugin highly susceptible to SQL injection vulnerabilities. Furthermore, the relatively low percentage of properly escaped output suggests a risk of cross-site scripting (XSS) vulnerabilities.

The taint analysis shows a flow with unsanitized paths, which, although not classified as critical or high severity in this instance, warrants attention as it indicates a potential pathway for malicious input to reach sensitive functions without proper sanitization. The lack of capability checks on any of its entry points means that even authenticated users might be able to access restricted functionalities if a vulnerability is discovered. The absence of any recorded vulnerabilities in its history might indicate a lack of prior scrutiny or successful mitigation of past issues, but it should not be a reason to overlook the current code-level risks.

In conclusion, while the plugin has a clean vulnerability history and a limited attack surface, the critical findings in static analysis, particularly raw SQL queries and insufficient output escaping, present substantial risks. These code-level weaknesses are more indicative of the current security posture than the absence of past CVEs.

Key Concerns

  • All SQL queries lack prepared statements
  • Less than 70% of outputs are properly escaped
  • Unsanitized path in taint flow
  • No capability checks on entry points
Vulnerabilities
None known

DietMaster Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DietMaster Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
39
44 escaped
Nonce Checks
2
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

53% escaped83 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<view-profile-form> (includes\view-profile-form.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DietMaster Integration Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[dietmaster-integration-profile-form] includes\functions.php:84
[dmi_if_profile] includes\functions.php:135
[dmi_no_profile] includes\functions.php:150
WordPress Hooks 16
actioninitdietmaster-integration.php:46
actionadmin_initdietmaster-integration.php:54
actionadmin_noticesdietmaster-integration.php:59
actionadmin_menuincludes\admin.php:32
actionadmin_initincludes\admin.php:52
actionadmin_headincludes\admin.php:315
actiontemplate_redirectincludes\functions.php:13
filterthe_contentincludes\functions.php:60
actionwpdmi_yesno_fieldsincludes\functions.php:127
actionwpdmi_form_noticeincludes\functions.php:165
actionwpdmi_initincludes\functions.php:184
actionwpdmi_process_profileincludes\functions.php:280
actionwpdmi_profile_passthruincludes\functions.php:377
actionwpdmi_initincludes\functions.php:771
actionwishlistmember_cancel_user_levelsincludes\functions.php:776
actionwishlistmember_uncancel_user_levelsincludes\functions.php:779
Maintenance & Trust

DietMaster Integration Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedDec 5, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

DietMaster Integration Developer Profile

Shingo

1 plugin · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DietMaster Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dietmaster-pro-nutrition/assets/css/admin.css/wp-content/plugins/dietmaster-pro-nutrition/assets/css/front.css/wp-content/plugins/dietmaster-pro-nutrition/assets/js/admin.js/wp-content/plugins/dietmaster-pro-nutrition/assets/js/front.js
Script Paths
/wp-content/plugins/dietmaster-pro-nutrition/assets/js/admin.js/wp-content/plugins/dietmaster-pro-nutrition/assets/js/front.js
Version Parameters
dietmaster-pro-nutrition/assets/css/admin.css?ver=dietmaster-pro-nutrition/assets/css/front.css?ver=dietmaster-pro-nutrition/assets/js/admin.js?ver=dietmaster-pro-nutrition/assets/js/front.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Dietmaster Pro Nutrition Content -->
Data Attributes
data-dietmaster-pro-nutrition-settings
JS Globals
DietmasterProNutrition
REST Endpoints
/wp-json/dietmaster-pro-nutrition/v1/settings
Shortcode Output
[dietmaster_nutrition_dashboard][dietmaster_nutrition_form][dietmaster_nutrition_mealplan][dietmaster_nutrition_tracker]
FAQ

Frequently Asked Questions about DietMaster Integration