Exploded View Filter Security & Risk Analysis

wordpress.org/plugins/exploded-view-filter

Displays a diagram image with links to filter products.

10 active installs v1.0.0 PHP + WP 4.7+ Updated Jan 28, 2026
diagramexploded-viewproduct-filter
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Exploded View Filter Safe to Use in 2026?

Generally Safe

Score 100/100

Exploded View Filter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'exploded-view-filter' v1.0.0 plugin exhibits a mixed security posture. While it avoids the use of dangerous functions, file operations, and external HTTP requests, significant concerns arise from its handling of entry points and data sanitization. The presence of one unprotected AJAX handler is a critical weakness, opening the door for potential unauthorized actions. Furthermore, the taint analysis revealing all four analyzed flows with unsanitized paths, even if not classified as critical or high severity, suggests a general lack of robust input validation. The output escaping also appears to be a weak point, with only 25% of outputs properly escaped, which could lead to cross-site scripting vulnerabilities.

The plugin's vulnerability history is currently clean, with no known CVEs. This is a positive indicator, but it does not negate the risks identified in the static analysis. The absence of past vulnerabilities could be due to the plugin's limited adoption, lack of focused security auditing, or simply luck. The total lack of nonce and capability checks on critical entry points like AJAX handlers further amplifies the risk.

In conclusion, while 'exploded-view-filter' has avoided some common pitfalls, its security is significantly undermined by its unprotected entry points and poor data sanitization practices. The unprotected AJAX handler and the prevalence of unsanitized flows are the most pressing issues that require immediate attention. Without addressing these, the plugin remains vulnerable despite its clean vulnerability history.

Key Concerns

  • Unprotected AJAX handler
  • Unsanitized paths in taint flows (4/4)
  • Low percentage of properly escaped output (25%)
  • No nonce checks
  • No capability checks
  • SQL queries not fully prepared (56%)
Vulnerabilities
None known

Exploded View Filter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Exploded View Filter Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
8 prepared
Unescaped Output
40
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

44% prepared18 total queries

Output Escaping

25% escaped53 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
process_bulk_action (Block\Adminhtml\Ef\Filter.php:87)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Exploded View Filter Attack Surface

Entry Points2
Unprotected1

AJAX Handlers 1

authwp_ajax_ef_get_attribute_optionsexploded-view-filter.php:101

Shortcodes 1

[exploded_view_filter] exploded-view-filter.php:83
WordPress Hooks 7
actionwp_enqueue_scriptsexploded-view-filter.php:76
actionadmin_enqueue_scriptsexploded-view-filter.php:77
actionwidgets_initexploded-view-filter.php:79
actionadmin_menuexploded-view-filter.php:81
actioninitexploded-view-filter.php:92
actionbefore_woocommerce_initexploded-view-filter.php:213
filterwp_prepare_attachment_for_jsModel\Observer.php:8
Maintenance & Trust

Exploded View Filter Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 28, 2026
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Exploded View Filter Developer Profile

Pektsekye

14 plugins · 6K total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Exploded View Filter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/exploded-view-filter/view/frontend/web/main.css/wp-content/plugins/exploded-view-filter/view/adminhtml/web/ef/filter/edit/main.css/wp-content/plugins/exploded-view-filter/view/adminhtml/web/ef/filter/edit/main.js
Script Paths
/wp-content/plugins/exploded-view-filter/view/adminhtml/web/ef/filter/edit/main.js

HTML / DOM Fingerprints

Data Attributes
data-widget-id="content"
JS Globals
efImagePath
REST Endpoints
/wp-json/ef_get_attribute_options
Shortcode Output
[exploded_view_filter]
FAQ

Frequently Asked Questions about Exploded View Filter