eTermin Booking Integration Security & Risk Analysis

wordpress.org/plugins/etermin-booking-integration

Easily integrate the eTermin.net online appointment scheduling calendar into your WordPress website via Shortcode.

0 active installs v1.2 PHP + WP 6.0+ Updated Jan 8, 2026
appointmentbookingcalendareterminschedule
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is eTermin Booking Integration Safe to Use in 2026?

Generally Safe

Score 100/100

eTermin Booking Integration has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "etermin-booking-integration" plugin v1.2 demonstrates a generally strong security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities due to prepared statements, and properly escaped output are significant strengths. The plugin also has no recorded vulnerabilities (CVEs), suggesting a history of stable and secure development. However, there are a few areas that warrant attention. The lack of nonce checks on the single identified shortcode is a concern, as this represents a potential entry point for cross-site request forgery (CSRF) attacks if the shortcode performs any sensitive actions. While the capability checks are present, their effectiveness in fully protecting the shortcode's functionality isn't detailed.

Despite the strong foundation, the absence of nonce checks on the shortcode is the most prominent weakness. This oversight, combined with the lack of a significant attack surface or recorded vulnerabilities, places the plugin in a relatively secure state. The vulnerability history being clear is a positive indicator. Overall, the plugin is well-developed from a security perspective, but addressing the potential CSRF risk associated with the shortcode would further enhance its security.

Key Concerns

  • Missing nonce check on shortcode
Vulnerabilities
None known

eTermin Booking Integration Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

eTermin Booking Integration Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
10 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped10 total outputs
Attack Surface

eTermin Booking Integration Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[etermin] etermin-booking.php:151
WordPress Hooks 3
actionadmin_menuetermin-booking.php:29
actionadmin_initetermin-booking.php:58
actionwp_enqueue_scriptsetermin-booking.php:103
Maintenance & Trust

eTermin Booking Integration Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 8, 2026
PHP min version
Downloads113

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

eTermin Booking Integration Developer Profile

eTermin

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect eTermin Booking Integration

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/etermin-booking-integration/etermin-booking-integration.php
Script Paths
https://www.eTermin.net/js/resizecustomersitescroll.min.js

HTML / DOM Fingerprints

CSS Classes
etermin-wrapper
Data Attributes
id="etifr"
Shortcode Output
<iframe id="etifr" src="https://www.etermin.net/
FAQ

Frequently Asked Questions about eTermin Booking Integration