eHive Objects Image Grid Security & Risk Analysis

wordpress.org/plugins/ehive-objects-image-grid

A plugin that enabled you to embed a grid of images from eHive on your site.

50 active installs v2.4.2 PHP 5.3+ WP 3.3.1+ Updated Sep 24, 2025
archivecollectionehivehistorymuseum
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 30, 2025
Safety Verdict

Is eHive Objects Image Grid Safe to Use in 2026?

Generally Safe

Score 99/100

eHive Objects Image Grid has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jan 30, 2025Updated 7mo ago
Risk Assessment

The "ehive-objects-image-grid" plugin v2.4.2 presents a mixed security posture. On the positive side, the static analysis reveals a very small attack surface, with no unprotected entry points detected. Furthermore, all SQL queries are properly prepared, and there are no indications of dangerous function usage, file operations, external HTTP requests, or bundled libraries. This suggests a generally cautious approach to certain aspects of secure coding.

However, several areas raise concerns. The most significant is the low percentage (10%) of properly escaped output. With 31 outputs analyzed, this means a substantial number of them are likely vulnerable to Cross-Site Scripting (XSS) attacks, as indicated by the vulnerability history. The complete lack of nonce and capability checks on the identified entry points (even if limited) is also a weakness, as it leaves these functions potentially open to unauthorized execution or manipulation.

The vulnerability history, which notes one medium-severity XSS vulnerability from early 2025, reinforces the concerns around output escaping. While currently unpatched vulnerabilities are zero, the recurring nature of XSS in the past and the low output escaping rate suggest a continued risk. The plugin's strengths lie in its limited attack surface and secure handling of database operations, but the prevalent lack of output sanitization is a notable security deficiency.

Key Concerns

  • Low output escaping percentage
  • No nonce checks on entry points
  • No capability checks on entry points
  • Medium severity vulnerability history (XSS)
Vulnerabilities
1 published

eHive Objects Image Grid Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-13662medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

eHive Objects Image Grid <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Jan 30, 2025 Patched in 2.4.2 (1d)
Version History

eHive Objects Image Grid Release Timeline

v2.4.2Current
v2.4.11 CVE
v2.4.01 CVE
v2.3.41 CVE
v2.3.31 CVE
v2.3.21 CVE
v2.3.11 CVE
v2.3.01 CVE
v2.1.41 CVE
v2.1.31 CVE
v2.1.21 CVE
v2.1.11 CVE
Code Analysis
Analyzed Mar 16, 2026

eHive Objects Image Grid Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
28
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

10% escaped31 total outputs
Attack Surface

eHive Objects Image Grid Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ehive_objects_image_grid] EHiveObjectsImageGrid.php:43
WordPress Hooks 5
actionadmin_initEHiveObjectsImageGrid.php:37
actionadmin_menuEHiveObjectsImageGrid.php:39
actionwp_print_stylesEHiveObjectsImageGrid.php:41
actionactivate_ehive-objects-image-grid/EHiveObjectsImageGrid.phpEHiveObjectsImageGrid.php:676
actiondeactivate_ehive-objects-image-grid/EHiveObjectsImageGrid.phpEHiveObjectsImageGrid.php:677
Maintenance & Trust

eHive Objects Image Grid Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 24, 2025
PHP min version5.3
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

eHive Objects Image Grid Developer Profile

Vernon Systems Limited

11 plugins · 360 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect eHive Objects Image Grid

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ehive-objects-image-grid/css/ehive-objects-image-grid.css/wp-content/plugins/ehive-objects-image-grid/js/options.js
Script Paths
/wp-content/plugins/ehive-objects-image-grid/js/options.js
Version Parameters
ehive-objects-image-grid/css/ehive-objects-image-grid.css?ver=ehive-objects-image-grid/js/options.js?ver=

HTML / DOM Fingerprints

CSS Classes
ehive-options-demo-image
Data Attributes
id="image_size"name="ehive_objects_image_grid_options[image_size]"id="name_enabled"name="ehive_objects_image_grid_options[name_enabled]"id="explore_type"name="ehive_objects_image_grid_options[explore_type]"+28 more
JS Globals
eHiveObjectsImageGridOptions
Shortcode Output
[ehive_objects_image_grid]
FAQ

Frequently Asked Questions about eHive Objects Image Grid