
Calendar Event Add-on WooCommerce Bookings Security & Risk Analysis
wordpress.org/plugins/gcal-event-addon-woocommerce-bookingsThis plugin is used to send additional information about the customer when WooCommerce Bookings creates an event in Google Calendar.
Is Calendar Event Add-on WooCommerce Bookings Safe to Use in 2026?
Generally Safe
Score 92/100Calendar Event Add-on WooCommerce Bookings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of gcal-event-addon-woocommerce-bookings v1.4 reveals a generally strong security posture, with no critical vulnerabilities identified in the attack surface, code signals, or taint analysis. The plugin exhibits excellent practices by avoiding dangerous functions, using prepared statements for all SQL queries, and reporting no external HTTP requests or file operations. Furthermore, the complete absence of known CVEs, both historically and currently, suggests a history of responsible development and patching.
However, a significant concern arises from the fact that 100% of the single output identified was not properly escaped. This represents a potential risk for cross-site scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. While the attack surface is currently zero, indicating no immediate direct entry points for exploitation, this single unescaped output is a weakness that could be exploited if the plugin's functionality evolves or if an attacker finds a way to inject data into that output context. The lack of capability checks and nonce checks, while not directly linked to a found vulnerability in this version, could become a concern if new entry points are added in future updates without proper security controls.
In conclusion, the plugin demonstrates a commitment to secure coding practices, particularly in its database interactions and avoidance of known dangerous functions. The clean vulnerability history further bolsters confidence. The primary weakness lies in the unescaped output, which, although a single instance, warrants attention. Developers should prioritize addressing this to ensure robust protection against potential XSS attacks.
Key Concerns
- Output not properly escaped
Calendar Event Add-on WooCommerce Bookings Security Vulnerabilities
Calendar Event Add-on WooCommerce Bookings Code Analysis
Output Escaping
Calendar Event Add-on WooCommerce Bookings Attack Surface
WordPress Hooks 4
Maintenance & Trust
Calendar Event Add-on WooCommerce Bookings Maintenance & Trust
Maintenance Signals
Community Trust
Calendar Event Add-on WooCommerce Bookings Alternatives
Custom Order Status for WooCommerce
custom-order-statuses-woocommerce
Custom Order Status for WooCommerce allows you to create and manage order statuses. It improves order management & overall order workflow.
Saphali Woocommerce Lite
saphali-woocommerce-lite
A set of additions to the WooCommerce online store. Adds localization & special tools in WooCommerce.
Customer Email Verification for WooCommerce
emails-verification-for-woocommerce
Enhance WooCommerce security and credibility with Email Verification best plugin. Ensure genuine customer interactions, eliminate spam, and elevate em …
Checkout Files Upload for WooCommerce
checkout-files-upload-woocommerce
Let your customers upload files on (or after) WooCommerce checkout.
Product Visibility by User Role for WooCommerce
product-visibility-by-user-role-for-woocommerce
Display WooCommerce products by customer's user role.
Calendar Event Add-on WooCommerce Bookings Developer Profile
1 plugin · 100 total installs
How We Detect Calendar Event Add-on WooCommerce Bookings
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
gcaleventwcbname="gcaleventwcb_event_description_additionals"id="gcaleventwcb_event_description_additionals"