Dive Admin Security & Risk Analysis

wordpress.org/plugins/dive-admin

DiveAdmin.com is a software solution for dive schools and diving centers.

0 active installs v1.0.8 PHP + WP 6.0+ Updated Jan 7, 2026
businessdivingmanagementscubatravel
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dive Admin Safe to Use in 2026?

Generally Safe

Score 100/100

Dive Admin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The dive-admin plugin v1.0.8 exhibits a generally good security posture in several key areas. The complete absence of dangerous functions, the consistent use of prepared statements for all SQL queries, and the proper escaping of all output are significant strengths. The plugin also demonstrates a lack of known vulnerabilities, with no recorded CVEs, which suggests a history of responsible development or a lack of past exploitation. The taint analysis also shows no critical or high-severity unsanitized flows, further bolstering confidence in its current security.

However, there are notable concerns regarding the attack surface. Specifically, the presence of two AJAX handlers that lack authentication checks represents a significant risk. While the plugin has a history of no known vulnerabilities, these unprotected entry points could be exploited by an attacker to execute unauthorized actions. The limited use of capability checks across the plugin's code, coupled with the unprotected AJAX handlers, indicates a potential weakness in access control that should be addressed to further harden the plugin's security. The external HTTP requests also warrant attention, although their nature isn't detailed, they could pose risks if not handled securely.

In conclusion, dive-admin v1.0.8 has commendable security practices in code execution and data handling. The lack of known vulnerabilities is a positive indicator. Nevertheless, the unprotected AJAX handlers present a clear and actionable security risk that must be mitigated. Addressing these access control gaps will significantly improve the overall security posture of the plugin.

Key Concerns

  • AJAX handlers without authentication checks
  • No capability checks in code
  • External HTTP requests detected
Vulnerabilities
None known

Dive Admin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dive Admin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
44 escaped
Nonce Checks
3
Capability Checks
0
File Operations
1
External Requests
4
Bundled Libraries
0

Output Escaping

100% escaped44 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
update_api_key (admin\class-dive-admin-admin.php:112)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Dive Admin Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 2

authwp_ajax_diveadmin_leadformincludes\class-dive-admin.php:164
noprivwp_ajax_diveadmin_leadformincludes\class-dive-admin.php:165

Shortcodes 3

[diveadmin_lead_form] includes\class-dive-admin.php:161
[diveadmin_trips_calendar] includes\class-dive-admin.php:162
[diveadmin_trips_list] includes\class-dive-admin.php:163
WordPress Hooks 9
actionadmin_enqueue_scriptsincludes\class-dive-admin.php:135
actionadmin_enqueue_scriptsincludes\class-dive-admin.php:136
actionadmin_menuincludes\class-dive-admin.php:138
actionadmin_post_dive_admin_update_apiincludes\class-dive-admin.php:140
actionadmin_post_diveadmin_settingsincludes\class-dive-admin.php:141
actionwp_enqueue_scriptsincludes\class-dive-admin.php:158
actionwp_enqueue_scriptsincludes\class-dive-admin.php:159
actionwoocommerce_store_api_checkout_order_processedincludes\class-dive-admin.php:169
actionwoocommerce_checkout_order_processedincludes\class-dive-admin.php:171
Maintenance & Trust

Dive Admin Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 7, 2026
PHP min version
Downloads589

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Dive Admin Developer Profile

awcode

4 plugins · 110 total installs

86
trust score
Avg Security Score
97/100
Avg Patch Time
38 days
View full developer profile
Detection Fingerprints

How We Detect Dive Admin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dive-admin/admin/css/dive-admin-admin.css
Script Paths
/wp-content/plugins/dive-admin/admin/js/dive-admin-admin.js
Version Parameters
dive-admin-admin.css?ver=dive-admin-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Dive Admin