HeyDay – Search More Security & Risk Analysis

wordpress.org/plugins/heyday-search

Boost engagement and conversions by keeping users on your site with HeyDay Search More’s enhanced search suggestions and real-time product discovery.

0 active installs v1.1.0 PHP 7.0+ WP 3.1+ Updated Feb 26, 2025
autocompletesearch-enginesearch-moresite-searchsuggestions
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is HeyDay – Search More Safe to Use in 2026?

Generally Safe

Score 92/100

HeyDay – Search More has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The heyday-search plugin v1.1.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query sanitation, exclusively using prepared statements, and has a high rate of properly escaped output. The absence of known CVEs and historical vulnerabilities is a significant strength, suggesting a generally stable and well-maintained codebase. However, the static analysis reveals critical security concerns primarily related to its attack surface. The presence of one unprotected REST API route represents a direct entry point for potential malicious activity without any authentication or permission checks. Furthermore, the lack of nonce checks on any of its entry points, combined with zero capability checks, exacerbates this risk, making it easier for unauthenticated or low-privileged users to trigger unintended actions. The taint analysis also shows flows with unsanitized paths, although these are not flagged as critical or high severity, they still warrant attention in conjunction with the exposed entry points. The plugin's reliance on external HTTP requests, while not inherently a vulnerability, increases its potential attack surface and dependency on external services. In conclusion, while the plugin is free from known vulnerabilities and uses good practices for database interactions and output handling, the unprotected REST API route and the absence of robust authorization mechanisms present a notable security risk that should be addressed.

Key Concerns

  • Unprotected REST API route
  • No nonce checks on entry points
  • No capability checks on entry points
  • Taint flows with unsanitized paths
Vulnerabilities
None known

HeyDay – Search More Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

HeyDay – Search More Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
2
33 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
5
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

94% escaped35 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
heyday_render_settings_page (includes\settings-page.php:23)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

HeyDay – Search More Attack Surface

Entry Points1
Unprotected1

REST API Routes 1

GET/wp-json/heyday-search/v1/items-paginationincludes\feed.php:299
WordPress Hooks 9
actionwp_enqueue_scriptsheyday-sm.php:26
actionwoocommerce_update_productincludes\feed.php:401
actionwoocommerce_new_productincludes\feed.php:405
actionwoocommerce_delete_productincludes\feed.php:409
actionrest_api_initincludes\feed.php:414
actionwp_enqueue_scriptsincludes\install.php:34
actionwp_enqueue_scriptsincludes\install.php:100
actionadmin_menuincludes\settings-page.php:11
actionadmin_enqueue_scriptsincludes\settings-page.php:132
Maintenance & Trust

HeyDay – Search More Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedFeb 26, 2025
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

HeyDay – Search More Developer Profile

heydaysearch

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect HeyDay – Search More

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/heyday-search/includes/install.php/wp-content/plugins/heyday-search/includes/feed.php/wp-content/plugins/heyday-search/includes/settings-page.php
Script Paths
https://cdn.heyday.io/cstmst/heyDayMain.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about HeyDay – Search More