Genesis Tabs Extended Security & Risk Analysis

wordpress.org/plugins/genesis-tabs-extended

Extended version of the Genesis Tabs plugin from Studiopress. Make selected posts unique on the page. And more...

20 active installs v1.2.1 PHP + WP 3.7+ Updated Apr 3, 2015
genesisgenesiswpstudiopresstabsui-tabs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Genesis Tabs Extended Safe to Use in 2026?

Generally Safe

Score 85/100

Genesis Tabs Extended has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "genesis-tabs-extended" v1.2.1 plugin exhibits a generally strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the plugin's attack surface. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and bundled libraries is a positive indicator. The fact that all SQL queries utilize prepared statements is excellent practice and mitigates the risk of SQL injection vulnerabilities.

However, a notable concern arises from the output escaping. With 72 total outputs and only 24% properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that user-supplied data, if not handled carefully, could be injected into the frontend and executed by users' browsers. The lack of nonce checks and capability checks on entry points (though the entry points are zero) also represents a missed opportunity for hardening, especially if future versions introduce new entry points. The plugin also has no recorded vulnerability history, which is positive but doesn't guarantee future security.

In conclusion, while the plugin demonstrates good development practices by minimizing its attack surface and securing its database interactions, the poor output escaping is a critical weakness that needs immediate attention. The plugin's strengths lie in its limited attack vectors and secure SQL handling, but the prevalence of unescaped output introduces a substantial XSS risk that must be addressed to improve its overall security.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Genesis Tabs Extended Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Genesis Tabs Extended Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
55
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

24% escaped72 total outputs
Attack Surface

Genesis Tabs Extended Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionafter_setup_themeplugin.php:47
actionwidgets_initplugin.php:62
actionwp_print_stylesplugin.php:64
actionwp_enqueue_scriptsplugin.php:65
actionwp_footerplugin.php:67
Maintenance & Trust

Genesis Tabs Extended Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedApr 3, 2015
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Genesis Tabs Extended Developer Profile

johanvandemerwe

4 plugins · 340 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Genesis Tabs Extended

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/genesis-tabs-extended/style.css
Version Parameters
genesis-tabs-extended/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
ui-tabsui-tabs-navui-tabs-hidemost-recent-tab
Data Attributes
id="cat-data-catid="
JS Globals
jQuery(document).ready(function($) { $(".ui-tabs").tabs(); });
Shortcode Output
<li><a href="#cat-<div id="cat-<h2><a href="
FAQ

Frequently Asked Questions about Genesis Tabs Extended