Extendify Security & Risk Analysis

wordpress.org/plugins/extendify

The best WordPress templates, pattern, and layout library with 1,000+ designs built for the Gutenberg block editor.

500K active installs v2.4.1 PHP 7.0+ WP 6.5+ Updated Mar 5, 2026
blocksgutenberglayoutspatternstemplates
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Extendify Safe to Use in 2026?

Generally Safe

Score 100/100

Extendify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The extendify plugin v2.4.1 demonstrates a generally strong security posture based on the provided static analysis. The complete absence of unescaped output and the significant percentage of SQL queries utilizing prepared statements are excellent indicators of secure coding practices. The plugin also correctly avoids dangerous functions and appears to have limited file operations and external HTTP requests, further reducing its potential attack surface.

However, a notable concern arises from the complete lack of nonce checks. While the static analysis did not identify any direct AJAX handlers or REST API routes without authentication, the absence of nonce checks is a critical oversight. This leaves any potential future endpoints, or even current ones that might have been missed in the analysis, vulnerable to Cross-Site Request Forgery (CSRF) attacks. The plugin also has only two capability checks, which might indicate insufficient authorization controls for certain functionalities, although without knowing the specific functions, this is a less certain deduction.

The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This suggests a history of responsible development and security awareness. In conclusion, extendify v2.4.1 is well-developed with strong output escaping and data sanitization practices, but the complete lack of nonce checks presents a significant, albeit potentially latent, security risk that needs immediate attention.

Key Concerns

  • Missing nonce checks on all entry points
  • Limited capability checks (2 total)
Vulnerabilities
None known

Extendify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Extendify Code Analysis

Dangerous Functions
0
Raw SQL Queries
12
16 prepared
Unescaped Output
0
16 escaped
Nonce Checks
0
Capability Checks
2
File Operations
8
External Requests
5
Bundled Libraries
0

SQL Query Safety

57% prepared28 total queries

Output Escaping

100% escaped16 total outputs
Attack Surface

Extendify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
filterrender_block_core/navigationapp\Agent\Controllers\SiteNavigationController.php:70
actiontemplate_redirectapp\Agent\TagTemplateParts.php:20
filterrender_block_dataapp\Agent\TagTemplateParts.php:25
filterrender_blockapp\Agent\TagTemplateParts.php:27
actionenqueue_block_editor_assetsapp\Draft\Admin.php:36
filterextendify_insights_dataapp\Insights.php:86
actionwp_loginapp\Insights.php:139
actionhttp_api_curlapp\Shared\DataProvider\ResourceData.php:34
filtercontent_save_preapp\Shared\Services\Import\Post.php:105
actioninitbootstrap.php:161
filterload_script_translation_filebootstrap.php:166
filterload_textdomain_mofilebootstrap.php:174
actionplugins_loadedextendify.php:76
actionupdate_optionextendify.php:81
actioncli_initextendify.php:96
actionupgrader_process_completeextendify.php:105
actionadmin_page_access_deniedextendify.php:140
filterhttp_request_argsextendify.php:149

Scheduled Events 2

extendify_update_domains_cache
extendify_update_domains_cache
Maintenance & Trust

Extendify Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 5, 2026
PHP min version7.0
Downloads11.4M

Community Trust

Rating94/100
Number of ratings10
Active installs500K
Developer Profile

Extendify Developer Profile

Extendify

2 plugins · 700K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extendify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/extendify/public/build/extendify-agent.css/wp-content/plugins/extendify/public/build/extendify-agent.js/wp-content/plugins/extendify/public/build/extendify-shared.css/wp-content/plugins/extendify/public/build/extendify-shared.js/wp-content/plugins/extendify/vendor/wp-extendify/wp-extendify-core/resources/css/inline.css
Script Paths
wp-content/plugins/extendify/public/build/extendify-agent.jswp-content/plugins/extendify/public/build/extendify-shared.js
Version Parameters
extendify/style.css?ver=extendify/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
extendify-agent-chatextendify-assistextendify-tourextendify-workflow-historywp-extendify-core
HTML Comments
<!-- Extendify Assist --><!-- Extendify Tour --><!-- Extendify Workflow History -->
Data Attributes
data-extendify-chat-targetdata-extendify-tour-targetdata-extendify-workflow-history-target
JS Globals
extendifyEXTENDIFY_BASE_URLEXTENDIFY_DEVMODEEXTENDIFY_PARTNER_ID
REST Endpoints
/wp-json/extendify/v1/chat/wp-json/extendify/v1/tour/wp-json/extendify/v1/workflow-history
Shortcode Output
[extendify_chat][extendify_tour][extendify_workflow_history]
FAQ

Frequently Asked Questions about Extendify