Huge Addons for Visual Composer Lite Security & Risk Analysis

wordpress.org/plugins/huge-addons-for-visual-composer-lite

Huge collections of addons for Visual Composer.

10 active installs v1.0.1 PHP + WP 4.7+ Updated Jan 10, 2018
addonspage-buildervisual-composer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Huge Addons for Visual Composer Lite Safe to Use in 2026?

Generally Safe

Score 85/100

Huge Addons for Visual Composer Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of "huge-addons-for-visual-composer-lite" v1.0.1 reveals a generally strong security posture with no identified vulnerabilities in its attack surface, code signals, or taint analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits potential entry points for attackers. Furthermore, the use of prepared statements for all SQL queries and the presence of nonce checks are positive security practices. The plugin also demonstrates no file operations or external HTTP requests, reducing risks associated with those areas.

However, a notable concern is the low percentage (12%) of properly escaped output. This indicates a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not correctly sanitized before being displayed. The lack of capability checks, while not directly indicative of a vulnerability given the limited attack surface, could become a concern if new entry points are introduced in future versions without proper authorization checks. The plugin's vulnerability history is clean, with no recorded CVEs, suggesting a historically secure codebase.

In conclusion, while the plugin exhibits strong practices in areas like SQL sanitization and attack surface reduction, the insufficient output escaping presents a clear, albeit potentially manageable, risk. The absence of capability checks on any entry points is a weakness that could be exploited if the plugin evolves. The lack of known vulnerabilities is a positive indicator, but the output escaping issue warrants attention.

Key Concerns

  • Low percentage of properly escaped output
  • No capability checks on entry points
Vulnerabilities
None known

Huge Addons for Visual Composer Lite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Huge Addons for Visual Composer Lite Release Timeline

v1.0.1Current
Code Analysis
Analyzed Apr 16, 2026

Huge Addons for Visual Composer Lite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
2 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

12% escaped17 total outputs
Attack Surface

Huge Addons for Visual Composer Lite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionvc_before_initaddons/havc-chart/havc-chart.php:17
actionvc_before_initaddons/havc-divider/havc-divider.php:17
actionvc_before_initaddons/havc-drop-cap/havc-drop-cap.php:17
actioninithuge-addons-for-visual-composer-lite.php:30
actionwp_enqueue_scriptshuge-addons-for-visual-composer-lite.php:41
actionadmin_enqueue_scriptshuge-addons-for-visual-composer-lite.php:54
actionplugins_loadedhuge-addons-for-visual-composer-lite.php:108
actionadmin_inithuge-addons-for-visual-composer-lite.php:127
actionadmin_noticeshuge-addons-for-visual-composer-lite.php:129
actionadmin_menuhuge-addons-for-visual-composer-lite.php:131
Maintenance & Trust

Huge Addons for Visual Composer Lite Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJan 10, 2018
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Huge Addons for Visual Composer Lite Developer Profile

dbiro

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Huge Addons for Visual Composer Lite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/huge-addons-for-visual-composer-lite/assets/fonts.css/wp-content/plugins/huge-addons-for-visual-composer-lite/assets/havc.css/wp-content/plugins/huge-addons-for-visual-composer-lite/assets/admin-style.css
Version Parameters
huge-addons-for-visual-composer-lite/assets/fonts.css?ver=huge-addons-for-visual-composer-lite/assets/havc.css?ver=huge-addons-for-visual-composer-lite/assets/admin-style.css?ver=

HTML / DOM Fingerprints

CSS Classes
havc-module-tabshavc_tabwpb_widgetised_column
HTML Comments
<!-- Module is activated --><!-- Module is not activated -->
Data Attributes
data-havc-module-iddata-module-active
JS Globals
HAVC_SLUG
Shortcode Output
<li class="all"><a href="<li class="active"><a href="<li class="inactive"><a href="<table class="wp-list-table widefat plugins">
FAQ

Frequently Asked Questions about Huge Addons for Visual Composer Lite