FareHarbor for WordPress Security & Risk Analysis

wordpress.org/plugins/fareharbor

Easily add FareHarbor reservation calendars, booking embeds, and buttons to your site.

9K active installs v3.6.12 PHP + WP 3.0+ Updated Feb 11, 2026
bookingbooking-calendarreservation-calendarreservation-pluginreservations
99
A · Safe
CVEs total2
Unpatched0
Last CVEOct 29, 2023
Safety Verdict

Is FareHarbor for WordPress Safe to Use in 2026?

Generally Safe

Score 99/100

FareHarbor for WordPress has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Oct 29, 2023Updated 1mo ago
Risk Assessment

The FareHarbor plugin v3.6.12 exhibits a mixed security posture. While the static analysis reveals a lack of dangerous functions, raw SQL queries, file operations, and external HTTP requests, indicating good coding practices in certain areas, significant concerns arise from the insufficient output escaping. With only 13% of outputs properly escaped, there's a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into web pages. The absence of nonce and capability checks on the identified entry points further exacerbates this risk by potentially exposing functionality to unauthorized users or automated attacks.

The vulnerability history is a critical concern. The plugin has a record of two medium-severity CVEs, both related to Cross-Site Scripting, with the most recent being in October 2023. The fact that these were medium severity and none are currently unpatched is positive, but the repeated nature of XSS vulnerabilities suggests a persistent weakness in how user input is handled and sanitized, which directly aligns with the low output escaping rate observed in the static analysis. The absence of any taint analysis flows is unusual for a plugin with a history of XSS, suggesting either the taint analysis tool was not fully effective or the identified XSS issues were subtle.

In conclusion, while the plugin demonstrates strengths in avoiding certain common vulnerabilities like raw SQL and dangerous functions, the low output escaping rate and historical XSS vulnerabilities present a significant risk. The lack of explicit authorization checks on entry points also contributes to potential security gaps. Developers should prioritize addressing the output escaping and input sanitization to mitigate XSS risks and ensure all entry points have appropriate authorization checks.

Key Concerns

  • Low output escaping rate
  • No nonce checks on entry points
  • No capability checks on entry points
  • History of medium severity CVEs (XSS)
Vulnerabilities
2

FareHarbor for WordPress Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2023-5252medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

FareHarbor for WordPress <= 3.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Oct 29, 2023 Patched in 3.6.8 (86d)
CVE-2023-25021medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

FareHarbor for WordPress <= 3.6.6 - Authenticated (Administrator+) Stored Cross-Site Scripting

Mar 3, 2023 Patched in 3.6.7 (326d)
Code Analysis
Analyzed Mar 16, 2026

FareHarbor for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

13% escaped8 total outputs
Attack Surface

FareHarbor for WordPress Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[fareharbor] fareharbor.php:61
[lightframe] fareharbor.php:62
[partners] fareharbor.php:63
[itemgrid] fareharbor.php:64
WordPress Hooks 5
actioninitfareharbor.php:19
actionadmin_menufareharbor.php:70
actionadmin_initfareharbor.php:71
actionwp_footerfareharbor.php:77
actionwp_enqueue_scriptsfareharbor.php:83
Maintenance & Trust

FareHarbor for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 11, 2026
PHP min version
Downloads130K

Community Trust

Rating86/100
Number of ratings4
Active installs9K
Developer Profile

FareHarbor for WordPress Developer Profile

FareHarbor

1 plugin · 9K total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
206 days
View full developer profile
Detection Fingerprints

How We Detect FareHarbor for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fareharbor/js/fareharbor.js/wp-content/plugins/fareharbor/css/fareharbor.css
Script Paths
https://fareharbor.com/embeds/api/v1/https://fh-kit.com/buttons/v1/https://fh-kit.com/buttons/v2/
Version Parameters
fareharbor/js/fareharbor.js?ver=fareharbor/css/fareharbor.css?ver=

HTML / DOM Fingerprints

CSS Classes
fh-calendarfh-embedfh-widget
HTML Comments
<!-- FareHarbor plugin activated --><!-- FareHarbor Booking Button -->
Data Attributes
data-fareharbor-shortnamedata-fareharbor-bookable-onlydata-fareharbor-id
JS Globals
window.fareharborvar fareharbor_settings
REST Endpoints
/wp-json/fareharbor/
Shortcode Output
[fareharbor][lightframe][partners][itemgrid]
FAQ

Frequently Asked Questions about FareHarbor for WordPress