igumbi Online Booking Security & Risk Analysis

wordpress.org/plugins/igumbi-online-booking

Generate commission free online bookings directly on your WordPress site by integrating the igumbi online booking tool/ IBE.

50 active installs v1.44 PHP + WP 3.0+ Updated Apr 30, 2025
accommodationsapartmentsbooking-calenderhotelibe
99
A · Safe
CVEs total1
Unpatched0
Last CVEFeb 20, 2025
Safety Verdict

Is igumbi Online Booking Safe to Use in 2026?

Generally Safe

Score 99/100

igumbi Online Booking has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Feb 20, 2025Updated 11mo ago
Risk Assessment

The igumbi-online-booking plugin exhibits a mixed security posture. On the positive side, the plugin uses prepared statements for all its SQL queries, demonstrates no critical or high-severity taint flows, and has no unpatched CVEs. The static analysis also shows a limited attack surface consisting of shortcodes, with no unprotected AJAX handlers or REST API routes. This suggests some good development practices in terms of preventing common injection vulnerabilities and unauthorized access to core functionalities.

However, several areas raise concerns. A significant portion of output (73%) is not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of any nonce checks and capability checks across its entry points is a major security oversight, potentially allowing unauthorized users to trigger plugin functionalities or manipulate data. The single external HTTP request is also a potential vector for further attacks if not handled securely. The plugin's vulnerability history, while currently clear of unpatched issues, shows a past XSS vulnerability, which, combined with the current lack of output escaping, suggests a recurring weakness in handling user-provided data safely.

In conclusion, while igumbi-online-booking has strengths in database interaction and a limited attack surface, the pervasive lack of output escaping and absence of nonces and capability checks represent substantial security risks. These issues could lead to XSS attacks and unauthorized actions, despite the absence of unpatched critical vulnerabilities.

Key Concerns

  • High percentage of unescaped output
  • No nonce checks on entry points
  • No capability checks on entry points
  • External HTTP request without clear security context
Vulnerabilities
1

igumbi Online Booking Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-13455medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

igumbi Online Booking <= 1.40 - Authenticated (Contributor+) Stored Cross-Site Scripting

Feb 20, 2025 Patched in 1.41 (1d)
Code Analysis
Analyzed Mar 16, 2026

igumbi Online Booking Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
44
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

27% escaped60 total outputs
Attack Surface

igumbi Online Booking Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[igumbi_dialog] igumbi-online-booking.php:47
[igumbi_avform] igumbi-online-booking.php:48
[igumbi_calendar] igumbi-online-booking.php:49
WordPress Hooks 4
actionadmin_menuigumbi-online-booking.php:108
actionadmin_initigumbi-online-booking.php:109
actioninitigumbi-online-booking.php:236
actionwidgets_initigumbi-online-booking.php:238
Maintenance & Trust

igumbi Online Booking Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 30, 2025
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

igumbi Online Booking Developer Profile

Roland Oth

1 plugin · 50 total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect igumbi Online Booking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/igumbi-online-booking/js/widget.js/wp-content/plugins/igumbi-online-booking/css/style.css
Script Paths
https://www.igumbi.net/seller/https://api.igumbi.net/calendars/start.js/

HTML / DOM Fingerprints

CSS Classes
igumbi_online_booking
Data Attributes
id="free_rooms"id="avform"id="igumbicalendar"
JS Globals
window.igumbi_dialogwindow.igumbi_avformwindow.igumbi_calendar
REST Endpoints
/wp-json/igumbi-online-booking/v1/settings
Shortcode Output
[igumbi_dialog][igumbi_avform][igumbi_calendar]
FAQ

Frequently Asked Questions about igumbi Online Booking