Future Ticketing Security & Risk Analysis

wordpress.org/plugins/future-ticketing

The Future Ticketing WordPress plugin allows you to connect with your Dashboard and load your event into a Wordpress post with just a few clicks.

10 active installs v1.0.0-beta PHP 7.0+ WP 5.6+ Updated Unknown
event-registrationregistrationrsvpticket-salestickets
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Future Ticketing Safe to Use in 2026?

Generally Safe

Score 100/100

Future Ticketing has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'future-ticketing' plugin v1.0.0-beta exhibits a strong security posture. The absence of dangerous functions, reliance on prepared statements for all SQL queries, and 100% proper output escaping are significant strengths. Furthermore, the plugin has no recorded vulnerabilities (CVEs), which suggests diligent development practices or a lack of targeting thus far. The plugin also has a limited attack surface, with only one shortcode and no unprotected entry points found in the static analysis.

However, there are a few points of concern that slightly temper the overall positive assessment. The most notable is the complete absence of nonce checks. While the plugin has a single capability check, the lack of nonces on its entry points, particularly its single shortcode, leaves it vulnerable to Cross-Site Request Forgery (CSRF) attacks if the shortcode's functionality can be exploited without proper user verification. Additionally, the "beta" version designation itself suggests that the plugin may not be as thoroughly tested as a stable release, potentially hiding undiscovered issues.

In conclusion, the 'future-ticketing' plugin demonstrates good security practices in its code. The absence of known vulnerabilities and secure handling of SQL and output are commendable. The primary weakness lies in the missing nonce checks, which introduces a potential CSRF risk. The beta status also warrants cautious optimism.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Future Ticketing Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Future Ticketing Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
9 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped9 total outputs
Attack Surface

Future Ticketing Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[futureticketing_event_display] includes\core-functions.php:59
WordPress Hooks 4
actionadmin_menuadmin\admin-menu.php:24
actionadmin_initadmin\settings-register.php:36
actionwp_enqueue_scriptsincludes\core-functions.php:57
actionenqueue_block_editor_assetsincludes\core-functions.php:58
Maintenance & Trust

Future Ticketing Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedUnknown
PHP min version7.0
Downloads761

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Future Ticketing Developer Profile

Future Ticketing

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Future Ticketing

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/future-ticketing/future-ticketing.js
Script Paths
https://embed.futureticketing.ie/

HTML / DOM Fingerprints

JS Globals
FTicketft_options
Shortcode Output
<div><script>var FTicket = FT({FT_event:'
FAQ

Frequently Asked Questions about Future Ticketing