hiWeb Core Security & Risk Analysis

wordpress.org/plugins/hiweb-core

The plugin allows you to quickly create Web sites on WordPress, immediately unpack and activate the archives of favorite plug-ins, show common adminis …

10 active installs v1.4.4.3 PHP + WP 4.1+ Updated May 5, 2016
admin-menu-post-editcustom-titledeveloppluginswidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is hiWeb Core Safe to Use in 2026?

Generally Safe

Score 85/100

hiWeb Core has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The hiweb-core plugin v1.4.4.3 exhibits a mixed security posture. While it has no recorded vulnerabilities (CVEs) and a seemingly limited attack surface in terms of exposed entry points (AJAX, REST API, shortcodes, cron), several concerning signals are present in its static analysis. The plugin utilizes dangerous functions such as shell_exec and exec, which can be exploited for remote code execution if not handled with extreme care and proper sanitization. Furthermore, a significant portion of its output is not properly escaped, potentially leading to cross-site scripting (XSS) vulnerabilities. The taint analysis indicates that all analyzed flows have unsanitized paths, though thankfully no critical or high severity issues were flagged in this specific analysis. The file operations count is high, which, combined with unsanitized paths, could be a vector for path traversal or arbitrary file read/write vulnerabilities if not properly secured. The plugin also has a limited number of nonce and capability checks relative to its total code signals, suggesting potential privilege escalation or unauthorized action risks. Overall, the lack of known vulnerabilities is positive, but the presence of dangerous functions, poor output escaping, and unsanitized paths in taint analysis present substantial risks that require diligent security practices to mitigate.

Key Concerns

  • Dangerous functions (shell_exec, exec)
  • Low percentage of properly escaped output
  • All taint flows have unsanitized paths
  • Limited nonce checks
  • Limited capability checks
Vulnerabilities
None known

hiWeb Core Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

hiWeb Core Code Analysis

Dangerous Functions
3
Raw SQL Queries
1
5 prepared
Unescaped Output
106
35 escaped
Nonce Checks
2
Capability Checks
6
File Operations
60
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

shell_exec$output = shell_exec('crontab -l');inc\hiweb-core-cron.php:32
shell_exec$output = shell_exec('echo "'.self::getStr_fromArr($jobs).'" | crontab -');inc\hiweb-core-cron.php:37
execexec('crontab -r', $crontab);inc\hiweb-core-cron.php:80

SQL Query Safety

83% prepared6 total queries

Output Escaping

25% escaped141 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

6 flows6 with unsanitized paths
getContent_fromUrl (inc\hiweb-core-curl.php:44)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

hiWeb Core Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 47
actionadmin_noticeshiweb-core-check.php:12
actionshutdowninc\hiweb-core-console.php:21
actionsave_postinc\hiweb-core-cpt\class-hiwebcptmeta.php:200
filterteeny_mce_before_initinc\hiweb-core-cpt\class-hiwebcptmeta.php:358
actionadmin_print_styles-post-new.phpinc\hiweb-core-cpt\class-hiwebcptmeta.php:698
actionadmin_print_styles-post.phpinc\hiweb-core-cpt\class-hiwebcptmeta.php:699
actionadmin_print_scripts-post-new.phpinc\hiweb-core-cpt\class-hiwebcptmeta.php:700
actionadmin_print_scripts-post.phpinc\hiweb-core-cpt\class-hiwebcptmeta.php:701
actionadmin_print_scripts-post-new.phpinc\hiweb-core-cpt\class-hiwebcptmeta.php:715
actionadmin_print_scripts-post.phpinc\hiweb-core-cpt\class-hiwebcptmeta.php:716
filterscpt_plugin_formatted_metainc\hiweb-core-cpt\class-hiwebcptmeta.php:793
actioninitinc\hiweb-core-cpt\class-hiwebcpttaxonomy.php:159
actioninitinc\hiweb-core-cpt\class-hiwebcpttype.php:167
actionwp_loadedinc\hiweb-core-cpt\class-hiwebcpttype.php:199
actionshutdowninc\hiweb-core-cpt\class-hiwebcpttype.php:200
actionadmin_print_stylesinc\hiweb-core-cpt\class-hiwebsptfont.php:37
actionscpt_plugin_icon_demosinc\hiweb-core-cpt\class-hiwebsptfont.php:38
filterscpt_plugin_icon_font_awesomeinc\hiweb-core-cpt\class-hiwebsptfont.php:39
actionscpt_plugin_icon_cssinc\hiweb-core-cpt\class-hiwebsptfont.php:87
actioninitinc\hiweb-core-cpt.php:73
actionwp_footerinc\hiweb-core-error.php:88
actionadmin_footerinc\hiweb-core-error.php:89
actionwp_enqueue_scriptsinc\hiweb-core-file.php:23
actionadmin_enqueue_scriptsinc\hiweb-core-file.php:24
actionlogin_enqueue_scriptsinc\hiweb-core-file.php:25
actionin_admin_footerinc\hiweb-core-file.php:27
actionwp_footerinc\hiweb-core-file.php:28
filtertemplateinc\hiweb-core-wp.php:691
filteroption_templateinc\hiweb-core-wp.php:692
filteroption_stylesheetinc\hiweb-core-wp.php:693
actionplugins_loadedinc\hiweb-core-wp_settings.php:14
actionadmin_menuinc\hiweb-core-wp_settings.php:16
filterplugin_action_linksinc\hiweb-core-wp_settings.php:18
filterwp_unique_post_sluginc\hiweb-core-wp_settings.php:20
actionwp_headinc\hiweb-core-wp_settings.php:22
filterplugin_row_metainc\hiweb-core-wp_settings.php:24
actionadd_meta_boxesinc\hiweb-core-wp_settings.php:29
actionsave_postinc\hiweb-core-wp_settings.php:30
filterthe_titleinc\hiweb-core-wp_settings.php:31
actionadmin_initinc\hiweb-core-wp_settings.php:36
actionadmin_menuinc\hiweb-core-wp_settings.php:38
actionadmin_menuinc\hiweb-core-wp_settings.php:41
actionadmin_enqueue_scriptsinc\hiweb-core-wp_settings.php:42
actionwp_footerinc\hiweb-core-wp_settings.php:49
actionwpinc\hiweb-core-wp_settings.php:58
filterthe_contentinc\hiweb-core-wp_settings.php:62
actionadmin_enqueue_scriptsinc\hiweb-core-wp_settings.php:91
Maintenance & Trust

hiWeb Core Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedMay 5, 2016
PHP min version
Downloads2K

Community Trust

Rating96/100
Number of ratings4
Active installs10
Developer Profile

hiWeb Core Developer Profile

Den Media

9 plugins · 100 total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect hiWeb Core

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hiweb-core/inc/hiweb-core-plugins.php/wp-content/plugins/hiweb-core/inc/settings.php/wp-content/plugins/hiweb-core/css/hiweb-core.css/wp-content/plugins/hiweb-core/css/hiweb-core-settings/hiweb-core-settings.css/wp-content/plugins/hiweb-core/js/hiweb-core.js/wp-content/plugins/hiweb-core/js/hiweb-core-wp/hiweb-core-wp.js
Version Parameters
hiweb-core.js?ver=hiweb-core.css?ver=

HTML / DOM Fingerprints

CSS Classes
hiweb-core-pluginshiweb-core-settings
HTML Comments
Easy as pie Custom post meta
Data Attributes
data-hiweb-core
JS Globals
hiweb
FAQ

Frequently Asked Questions about hiWeb Core