Hoeboe Security & Risk Analysis

wordpress.org/plugins/hoeboe

Easily update WordPress transients in the background via AJAX to increase site speed and avoid long page load times. Hoeboe can be especially helpful …

0 active installs v0.1.4 PHP 5.3+ WP 3.5+ Updated Unknown
ajaxapicachecachingtransients
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hoeboe Safe to Use in 2026?

Generally Safe

Score 100/100

Hoeboe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'hoeboe' plugin v0.1.4 exhibits a generally positive security posture based on the static analysis. It demonstrates good practice by implementing capability checks on all identified entry points, which include two AJAX handlers. Furthermore, the plugin utilizes prepared statements for its single SQL query, mitigating the risk of SQL injection vulnerabilities. The absence of known CVEs and a clean vulnerability history suggest a history of secure development. However, a notable area for improvement is output escaping, where only 25% of the outputs are properly escaped. This indicates a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed in the frontend or backend.

While the plugin benefits from a limited attack surface and the diligent use of security measures like capability checks and prepared statements, the low percentage of properly escaped output is a significant concern. Taint analysis shows no critical or high severity flows, which is reassuring. The file operation and external HTTP request are single instances and their context is not provided, but the absence of taint issues around them is positive. In conclusion, 'hoeboe' v0.1.4 is largely secure due to its authentication and data handling practices, but the weak output escaping requires immediate attention to prevent potential XSS attacks.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Hoeboe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Hoeboe Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
18
6 escaped
Nonce Checks
1
Capability Checks
2
File Operations
1
External Requests
1
Bundled Libraries
1

Bundled Libraries

jQuery

SQL Query Safety

100% prepared1 total queries

Output Escaping

25% escaped24 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
hoe__boe (inc\Hoeboe_Extras.php:12)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Hoeboe Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_hoe__boeinc\Hoeboe_Extras.php:9
noprivwp_ajax_hoe__boeinc\Hoeboe_Extras.php:10
WordPress Hooks 3
actionadmin_noticesinc\hoeboe__version_check.php:23
actionadmin_menuinc\Hoe_Boe.php:60
actioninitinc\Hoe_Boe.php:61
Maintenance & Trust

Hoeboe Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedUnknown
PHP min version5.3
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Hoeboe Developer Profile

Twice Two Media

2 plugins · 10 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hoeboe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hoeboe/assets/img/hoeboe.png

HTML / DOM Fingerprints

CSS Classes
hoeboe-settings
HTML Comments
//hoe//boe
Data Attributes
data-hoeboe-toggle
FAQ

Frequently Asked Questions about Hoeboe