eHive Search Security & Risk Analysis

wordpress.org/plugins/ehive-search

A plugin that give you the power to search eHive Objects from your WordPress website.

60 active installs v2.5.1 PHP 8.2+ WP 3.3.1+ Updated Nov 19, 2025
archivecollectionehivehistorymuseum
99
A · Safe
CVEs total1
Unpatched0
Last CVEJan 6, 2026
Safety Verdict

Is eHive Search Safe to Use in 2026?

Generally Safe

Score 99/100

eHive Search has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jan 6, 2026Updated 5mo ago
Risk Assessment

The ehive-search plugin version 2.5.1 demonstrates a generally good security posture with its static analysis results, notably lacking dangerous functions, external HTTP requests, and file operations. All identified entry points, including the single shortcode, do not appear to have explicit authorization checks, which is a concern. However, SQL queries are all properly prepared, mitigating risks of SQL injection. The most significant area for improvement is output escaping, with 32% of outputs not being properly escaped, potentially leading to Cross-Site Scripting (XSS) vulnerabilities. The vulnerability history shows one past medium severity vulnerability related to XSS, which is concerning given the current output escaping issues. While the plugin has no currently unpatched vulnerabilities, the past XSS issue and the observed output escaping weakness suggest a recurring risk. Overall, the plugin benefits from strong SQL handling and a limited attack surface, but requires attention to output sanitization to prevent XSS.

Despite the positive aspects like prepared SQL statements and zero critical taint flows, the 32% of unescaped output is a significant weakness. This, combined with the history of an XSS vulnerability, creates a medium-level risk. The absence of capability checks and nonce checks on the shortcode (the only identified entry point) further amplifies this risk, as it implies that any user can trigger the shortcode's functionality without proper authorization, potentially exposing them to the unescaped output. The plugin's strengths in SQL security are overshadowed by the potential for XSS due to insufficient output sanitization.

Key Concerns

  • Unescaped output (32% of outputs)
  • Shortcode without capability checks
  • Shortcode without nonce checks
  • History of medium severity XSS vulnerability
Vulnerabilities
1 published

eHive Search Security Vulnerabilities

CVEs by Year

1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-67930medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

eHive Search <= 2.5.0 - Reflected Cross-Site Scripting

Jan 6, 2026 Patched in 2.5.1 (8d)
Version History

eHive Search Release Timeline

v2.5.1Current
v2.5.01 CVE
v2.4.51 CVE
v2.4.41 CVE
v2.4.31 CVE
v2.4.21 CVE
v2.4.11 CVE
v2.4.01 CVE
v2.3.91 CVE
v2.3.81 CVE
v2.3.71 CVE
v2.3.61 CVE
v2.3.51 CVE
v2.3.41 CVE
v2.3.31 CVE
v2.3.21 CVE
v2.3.11 CVE
v2.3.01 CVE
v2.1.61 CVE
v2.1.51 CVE
Code Analysis
Analyzed Mar 16, 2026

eHive Search Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
42
91 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

68% escaped133 total outputs
Attack Surface

eHive Search Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ehive_search] EHiveSearch.php:43
WordPress Hooks 8
actioninitEHiveSearch.php:38
actionadmin_initEHiveSearch.php:39
actionadmin_menuEHiveSearch.php:40
actionwp_print_stylesEHiveSearch.php:42
actionpre_get_postsEHiveSearch.php:47
filterquery_varsEHiveSearch.php:1042
actionactivate_ehive-search/EHiveSearch.phpEHiveSearch.php:1045
actiondeactivate_ehive-search/EHiveSearch.phpEHiveSearch.php:1046
Maintenance & Trust

eHive Search Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 19, 2025
PHP min version8.2
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

eHive Search Developer Profile

Vernon Systems Limited

11 plugins · 360 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect eHive Search

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ehive-search/css/eHiveAdmin.css/wp-content/plugins/ehive-search/js/admin.js/wp-content/plugins/ehive-search/js/main.js
Script Paths
/wp-content/plugins/ehive-search/js/admin.js/wp-content/plugins/ehive-search/js/main.js
Version Parameters
ehive-search/css/eHiveAdmin.css?ver=ehive-search/js/admin.js?ver=ehive-search/js/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
ehive_search_results_wrapperehive_search_result_itemehive_search_result_item_imgehive_search_result_item_titleehive_search_result_item_detailsehive-search-advanced-options-cssehive-search-admin-cssehive-search-lightbox-css+2 more
HTML Comments
<!-- EHive Search Result Item --><!-- EHive Search Result Wrapper -->
Data Attributes
data-ehive-search-optionsdata-ehive-search-id
JS Globals
window.eHiveSearchOptions
Shortcode Output
[ehive_search]
FAQ

Frequently Asked Questions about eHive Search