
igumbi Online Booking Security & Risk Analysis
wordpress.org/plugins/igumbi-online-bookingGenerate commission free online bookings directly on your WordPress site by integrating the igumbi online booking tool/ IBE.
Is igumbi Online Booking Safe to Use in 2026?
Generally Safe
Score 99/100igumbi Online Booking has a strong security track record. Known vulnerabilities have been patched promptly.
The igumbi-online-booking plugin exhibits a mixed security posture. On the positive side, the plugin uses prepared statements for all its SQL queries, demonstrates no critical or high-severity taint flows, and has no unpatched CVEs. The static analysis also shows a limited attack surface consisting of shortcodes, with no unprotected AJAX handlers or REST API routes. This suggests some good development practices in terms of preventing common injection vulnerabilities and unauthorized access to core functionalities.
However, several areas raise concerns. A significant portion of output (73%) is not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of any nonce checks and capability checks across its entry points is a major security oversight, potentially allowing unauthorized users to trigger plugin functionalities or manipulate data. The single external HTTP request is also a potential vector for further attacks if not handled securely. The plugin's vulnerability history, while currently clear of unpatched issues, shows a past XSS vulnerability, which, combined with the current lack of output escaping, suggests a recurring weakness in handling user-provided data safely.
In conclusion, while igumbi-online-booking has strengths in database interaction and a limited attack surface, the pervasive lack of output escaping and absence of nonces and capability checks represent substantial security risks. These issues could lead to XSS attacks and unauthorized actions, despite the absence of unpatched critical vulnerabilities.
Key Concerns
- High percentage of unescaped output
- No nonce checks on entry points
- No capability checks on entry points
- External HTTP request without clear security context
igumbi Online Booking Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
igumbi Online Booking <= 1.40 - Authenticated (Contributor+) Stored Cross-Site Scripting
igumbi Online Booking Code Analysis
Output Escaping
igumbi Online Booking Attack Surface
Shortcodes 3
WordPress Hooks 4
Maintenance & Trust
igumbi Online Booking Maintenance & Trust
Maintenance Signals
Community Trust
igumbi Online Booking Alternatives
Widgets for Airbnb Reviews
review-widgets-for-airbnb
Embed Airbnb reviews fast and easily into your WordPress site. Increase SEO, trust and sales using Airbnb reviews.
BookServe Online Booking Calendar
book-serve-reservations
Makes a calendar and booking form widget to take the user to the Book Serve Hotel Booking Engine.
WP-Reservation booking system
wp-reservation
WP-Reservation - This WordPress plugin allows for the creation of own sites with a booking system. It can apply to their sites hostels, hotels, hotels …
Hsforms
hsforms
hotelsuite FORM (hs FORMS) will show a form to book hotel rooms with some customized configurations.
MC4WP: Mailchimp for WordPress
mailchimp-for-wp
The #1 Mailchimp plugin for WordPress. Allows you to add a multitude of newsletter sign-up methods to your site.
igumbi Online Booking Developer Profile
1 plugin · 50 total installs
How We Detect igumbi Online Booking
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/igumbi-online-booking/js/widget.js/wp-content/plugins/igumbi-online-booking/css/style.csshttps://www.igumbi.net/seller/https://api.igumbi.net/calendars/start.js/HTML / DOM Fingerprints
igumbi_online_bookingid="free_rooms"id="avform"id="igumbicalendar"window.igumbi_dialogwindow.igumbi_avformwindow.igumbi_calendar/wp-json/igumbi-online-booking/v1/settings[igumbi_dialog][igumbi_avform][igumbi_calendar]