hiWeb Plugins Server Security & Risk Analysis

wordpress.org/plugins/hiweb-plugins-server

Create your own plugins repository and downloading them to their sites faster and easier than with the WordPress repository

10 active installs v2.2.0.0 PHP + WP 4.1+ Updated Nov 27, 2016
admin-clientadmin-pluginsadmin-repositoryadmin-servereasy-server
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is hiWeb Plugins Server Safe to Use in 2026?

Generally Safe

Score 85/100

hiWeb Plugins Server has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'hiweb-plugins-server' v2.2.0.0 plugin exhibits a concerning security posture due to a significant number of unprotected AJAX handlers. With 6 AJAX handlers identified, and all of them lacking authentication checks, this represents a substantial attack surface that could be exploited by unauthenticated users. While the plugin demonstrates good practices in other areas, such as using prepared statements for all SQL queries and not bundling external libraries, the unprotected AJAX endpoints are a critical weakness.

The taint analysis revealed flows with unsanitized paths, indicating a potential for path traversal vulnerabilities. Although no critical or high-severity taint flows were found, the presence of any unsanitized paths is a red flag. The lack of nonce checks and capability checks on these AJAX handlers further exacerbates the risk, as it allows for potential Cross-Site Request Forgery (CSRF) attacks or unauthorized actions.

The plugin's vulnerability history shows no recorded CVEs, which is a positive sign. However, this does not negate the risks identified in the static analysis. The absence of past vulnerabilities could be due to a lack of focused security auditing or that the vulnerabilities present have simply not been discovered or exploited yet. The overall conclusion is that while the plugin has some strengths in its SQL handling, the unprotected AJAX endpoints and unsanitized path flows present significant security risks that need immediate attention.

Key Concerns

  • All AJAX handlers lack authentication checks
  • Flows with unsanitized paths found
  • No nonce checks on AJAX handlers
  • No capability checks on AJAX handlers
  • Low percentage of properly escaped output
Vulnerabilities
None known

hiWeb Plugins Server Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

hiWeb Plugins Server Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
43
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
12
External Requests
0
Bundled Libraries
0

Output Escaping

2% escaped44 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ajax_remote_url_update (inc\class-hooks.php:82)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
6 unprotected

hiWeb Plugins Server Attack Surface

Entry Points6
Unprotected6

AJAX Handlers 6

authwp_ajax_hw_plugins_server_status_toggleinc\hooks.php:15
authwp_ajax_hw_plugins_server_kickback_status_toggleinc\hooks.php:16
authwp_ajax_hw_plugins_server_host_actioninc\hooks.php:17
authwp_ajax_hw_plugins_server_remoteinc\hooks.php:18
authwp_ajax_hw_plugins_server_remote_url_updateinc\hooks.php:19
noprivwp_ajax_hw_plugins_serverinc\hooks.php:20
WordPress Hooks 7
filterplugin_action_linksinc\hooks.php:9
filterplugin_action_links_hiweb-plugins-server/hiweb-plugins-server.phpinc\hooks.php:10
actionadmin_noticesinc\hooks.php:11
actionpre_current_active_pluginsinc\hooks.php:12
actionadmin_menuinc\options.php:11
actionwp_enqueue_scriptsinc\script-styles.php:36
actionadmin_enqueue_scriptsinc\script-styles.php:37
Maintenance & Trust

hiWeb Plugins Server Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedNov 27, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

hiWeb Plugins Server Developer Profile

Den Media

9 plugins · 100 total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect hiWeb Plugins Server

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hiweb-plugins-server/css//wp-content/plugins/hiweb-plugins-server/js/
Script Paths
/wp-content/plugins/hiweb-plugins-server/js//wp-content/plugins/hiweb-plugins-server/css/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about hiWeb Plugins Server