eHive Objects Tag Cloud Security & Risk Analysis

wordpress.org/plugins/ehive-objects-tag-cloud

A plugin that allows you to embed a cloud of popular eHive tags on your website.

20 active installs v2.4.0 PHP 5.3+ WP 3.3.1+ Updated Sep 25, 2025
archivecollectionehivehistorymuseum
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is eHive Objects Tag Cloud Safe to Use in 2026?

Generally Safe

Score 100/100

eHive Objects Tag Cloud has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The ehive-objects-tag-cloud plugin, version 2.4.0, exhibits a mixed security posture. The static analysis indicates a very small attack surface with only one shortcode and no unprotected entry points, which is a positive sign. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests suggests a limited potential for certain types of exploitation. The fact that all SQL queries utilize prepared statements is also a strong security practice. The lack of any recorded vulnerabilities in its history further reinforces a perception of a relatively secure plugin.

However, a significant concern arises from the output escaping. With 100% of its outputs not being properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed and displayed by the plugin, if not properly sanitized before rendering, could be manipulated by an attacker to inject malicious scripts. The complete absence of taint analysis results and nonce checks, while not directly indicative of a vulnerability given the limited attack surface, does mean that the plugin is not actively being checked for these common security flaws. The lack of capability checks also means that access control might not be as robust as it could be, although with no AJAX or REST API routes, this is less immediately concerning.

In conclusion, while the plugin boasts a clean vulnerability history and good practices in areas like SQL querying and minimizing attack vectors, the critical weakness in output escaping demands immediate attention. This oversight could be exploited to introduce XSS vulnerabilities, undermining the overall security of a WordPress site. The plugin's strengths lie in its minimal attack surface and secure SQL handling, but its susceptibility to XSS due to unescaped output is a significant drawback.

Key Concerns

  • Outputs not properly escaped
Vulnerabilities
None known

eHive Objects Tag Cloud Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

eHive Objects Tag Cloud Release Timeline

v2.4.0Current
v2.3.3
v2.3.2
v2.3.1
v2.1.1
Code Analysis
Analyzed Mar 16, 2026

eHive Objects Tag Cloud Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

eHive Objects Tag Cloud Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ehive_objects_tag_cloud] EHiveObjectsTagCloud.php:39
WordPress Hooks 5
actionadmin_initEHiveObjectsTagCloud.php:34
actionadmin_menuEHiveObjectsTagCloud.php:35
actionwp_print_stylesEHiveObjectsTagCloud.php:37
actionactivate_ehive-objects-tag-cloud/EHiveObjectsTagCloud.phpEHiveObjectsTagCloud.php:280
actiondeactivate_ehive-objects-tag-cloud/EHiveObjectsTagCloud.phpEHiveObjectsTagCloud.php:281
Maintenance & Trust

eHive Objects Tag Cloud Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 25, 2025
PHP min version5.3
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

eHive Objects Tag Cloud Developer Profile

Vernon Systems Limited

11 plugins · 360 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect eHive Objects Tag Cloud

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ehive-objects-tag-cloud/css/eHiveObjectsTagCloud.css
Version Parameters
ehive-objects-tag-cloud/css/eHiveObjectsTagCloud.css?ver=ehive-objects-tag-cloud/EHiveObjectsTagCloud.php?ver=

HTML / DOM Fingerprints

CSS Classes
ehive-tag-cloud
Data Attributes
data-ehive-tag-cloud-limitdata-ehive-tag-cloud-css-class
Shortcode Output
[ehive_objects_tag_cloud][ehive_objects_tag_cloud limit=[ehive_objects_tag_cloud css_class=[ehive_objects_tag_cloud css_class=
FAQ

Frequently Asked Questions about eHive Objects Tag Cloud