ionCube Tester Plus Security & Risk Analysis

wordpress.org/plugins/ioncube-tester-plus

This plugin helps you to determine if the ionCube loaders are installed correctly on your web server. This plugin is sponsored by "Maps Marker Pr …

300 active installs v1.5 PHP + WP 2.2+ Updated Jan 11, 2026
encodingioncubeloaderphptest
94
A · Safe
CVEs total1
Unpatched0
Last CVEMar 4, 2026
Safety Verdict

Is ionCube Tester Plus Safe to Use in 2026?

Generally Safe

Score 94/100

ionCube Tester Plus has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Mar 4, 2026Updated 2mo ago
Risk Assessment

The "ioncube-tester-plus" v1.5 plugin presents a mixed security posture, with some encouraging signs but also significant areas of concern. The static analysis reveals a very limited attack surface, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, which is generally positive for reducing immediate exploit vectors. Furthermore, all identified SQL queries utilize prepared statements, a strong indicator of good database interaction practices. However, the presence of dangerous functions like `unserialize`, `shell_exec`, and `system` is a major red flag, as these can be exploited for arbitrary code execution if not handled with extreme care and robust input validation, which the analysis suggests is lacking.

The taint analysis shows one flow with unsanitized paths, which, while not a critical or high severity issue in this instance, still points to potential weaknesses in how user-supplied data influencing file operations or commands is handled. The vulnerability history is particularly concerning, with one past critical vulnerability categorized as Path Traversal. Although there are no currently unpatched CVEs, the existence of a critical path traversal vulnerability in the past, coupled with the use of functions susceptible to such attacks and the indication of unsanitized paths, suggests a recurring or underlying issue in secure coding practices.

In conclusion, while the plugin benefits from a small attack surface and secure SQL practices, the critical danger functions, potential for unsanitized paths, and past critical vulnerability indicate a high risk of severe security incidents. The lack of capability checks and nonce checks on the identified entry points (even though there are zero) would be a major concern if those entry points were present and exposed to user input, and their absence in the analysis highlights an area that requires constant vigilance. The plugin developer must prioritize addressing the dangerous functions and ensuring all file operations and command executions are thoroughly sanitized.

Key Concerns

  • Dangerous functions found (unserialize, shell_exec, system)
  • Unsanitized paths in taint analysis flow
  • Past critical vulnerability (Path Traversal)
  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
1

ionCube Tester Plus Security Vulnerabilities

CVEs by Year

1 CVE in 2026
2026
Patched Has unpatched

Severity Breakdown

Critical
1

1 total CVE

CVE-2025-69411critical · 9.1Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

ionCube Tester Plus <= 1.3 - Unauthenticated Arbitrary File Download

Mar 4, 2026 Patched in 1.4 (9d)
Code Analysis
Analyzed Mar 16, 2026

ionCube Tester Plus Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
89
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
21
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$unserialised_res = @unserialize($serialised_res);loader-wizard.php:275
shell_exec$cmd = @shell_exec('sestatus');loader-wizard.php:868
shell_exec$cmd = @shell_exec('gradm -S');loader-wizard.php:880
system$result = @system($script,$retval);loader-wizard.php:1996

Output Escaping

9% escaped98 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<loader-wizard> (loader-wizard.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ionCube Tester Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_noticesioncube-tester-plus.php:29
actionadmin_menuioncube-tester-plus.php:30
Maintenance & Trust

ionCube Tester Plus Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 11, 2026
PHP min version
Downloads19K

Community Trust

Rating100/100
Number of ratings2
Active installs300
Developer Profile

ionCube Tester Plus Developer Profile

Robert Seyfriedsberger

3 plugins · 10K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
1302 days
View full developer profile
Detection Fingerprints

How We Detect ionCube Tester Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ioncube-tester-plus/style.css/wp-content/plugins/ioncube-tester-plus/script.js
Script Paths
/wp-content/plugins/ioncube-tester-plus/script.js
Version Parameters
ioncube-tester-plus/style.css?ver=ioncube-tester-plus/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- ionCube Loader install Wizard --><!-- ionCube is a registered trademark of ionCube Ltd. --><!-- Copyright (c) ionCube Ltd. 2002-2011 -->
FAQ

Frequently Asked Questions about ionCube Tester Plus