Frontend Dashboard Extra Security & Risk Analysis

wordpress.org/plugins/frontend-dashboard-extra

Frontend Dashboard Extra WordPress plugin is a supportive plugin for Frontend Dashboard with supportive additional features likes extra Calendar for s …

200 active installs v1.6 PHP + WP 5.8+ Updated Mar 8, 2024
dashboarddatefile-uploadfrontend-dashboard-extraimage-upload
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Frontend Dashboard Extra Safe to Use in 2026?

Generally Safe

Score 85/100

Frontend Dashboard Extra has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The static analysis of "frontend-dashboard-extra" v1.6 reveals a plugin with a seemingly small attack surface, reporting zero AJAX handlers, REST API routes, shortcodes, or cron events. This, combined with 100% prepared statement usage for SQL queries, suggests some adherence to secure coding practices. However, the presence of three instances of the `unserialize` function, a known vector for remote code execution vulnerabilities when processing untrusted input, is a significant concern. The low percentage of properly escaped output (27%) also indicates a risk of cross-site scripting (XSS) vulnerabilities, as sensitive data might be rendered directly in the browser without proper sanitization.

The plugin's vulnerability history is clean, with no recorded CVEs. While this is positive, it doesn't negate the risks identified in the static analysis. A lack of past vulnerabilities can sometimes be attributed to the plugin not being targeted or thoroughly audited, rather than an inherent state of perfect security. The absence of taint analysis results also limits the understanding of how data flows might be exploited.

In conclusion, while the plugin has strengths like secure SQL handling and a clean vulnerability record, the identified "dangerous functions" like `unserialize` and the poor output escaping practices present notable security weaknesses. The lack of observed taint flows and the absence of explicit capability or nonce checks on any entry points (though there are no entry points identified) means potential vulnerabilities could exist if any of these points were to be introduced or remain undiscovered.

Key Concerns

  • Presence of dangerous unserialize function
  • Low percentage of properly escaped output
  • Missing nonce checks (where applicable)
  • Missing capability checks (where applicable)
Vulnerabilities
None known

Frontend Dashboard Extra Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Frontend Dashboard Extra Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
33
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$extended = isset( $options['extended'] ) ? ( is_string( $options['extended'] ) ? unserialize( $optifields\FEDEFormWPEditor.php:18
unserialize$default['extended'] = unserialize( $row['extended'] );fields\FEDEFormWPEditor.php:70
unserialize$extended = unserialize( $extended );menu\FEDE_Menu.php:72

Output Escaping

27% escaped45 total outputs
Attack Surface

Frontend Dashboard Extra Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
filterfed_default_extended_fieldsfields\FEDEFormWPEditor.php:38
filterfed_process_form_fieldsfields\FEDEFormWPEditor.php:39
actionadmin_noticesfrontend-dashboard-extra.php:60
filterfed_plugin_versionsfunctions.php:10
actionfed_enqueue_script_style_adminfunctions.php:39
actionfed_enqueue_script_style_frontendfunctions.php:40
actionfed_admin_input_item_optionsmenu\FEDE_Menu.php:17
actionfed_admin_input_fields_container_extramenu\FEDE_Menu.php:18
actionfed_admin_input_fields_container_extramenu\FEDE_Menu.php:24
actionfed_admin_input_fields_container_extramenu\FEDE_Menu.php:30
actionfed_admin_input_fields_container_extramenu\FEDE_Menu.php:36
actionfed_admin_input_fields_container_extramenu\FEDE_Menu.php:42
actionfed_admin_input_fields_container_extramenu\FEDE_Menu.php:48
filterfed_custom_input_fieldsmenu\FEDE_Menu.php:55
Maintenance & Trust

Frontend Dashboard Extra Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 8, 2024
PHP min version
Downloads91K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

Frontend Dashboard Extra Developer Profile

M A Vinoth Kumar

18 plugins · 4K total installs

67
trust score
Avg Security Score
83/100
Avg Patch Time
462 days
View full developer profile
Detection Fingerprints

How We Detect Frontend Dashboard Extra

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/frontend-dashboard-extra/assets/script.js
Script Paths
/wp-content/plugins/frontend-dashboard-extra/assets/script.js
Version Parameters
frontend-dashboard-extra/assets/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Frontend Dashboard Extra