Jeero Security & Risk Analysis

wordpress.org/plugins/jeero

Imports events and tickets from your existing ticketing solution to The Events Calendar and other popular calendar plugins.

100 active installs v1.33.3 PHP 7.2+ WP 4.9+ Updated Jan 28, 2026
calendareventsticketmasterticketsveezi
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jeero Safe to Use in 2026?

Generally Safe

Score 100/100

Jeero has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The 'jeero' plugin v1.33.3 exhibits a generally strong security posture in several key areas. The absence of any known CVEs and the lack of identified critical or high-severity vulnerabilities in its history are positive indicators. The static analysis reveals a commendable approach to database interactions, with 100% of SQL queries using prepared statements. Furthermore, the plugin demonstrates awareness of security best practices by implementing nonce and capability checks, and it avoids bundling external libraries, which can often be a source of vulnerabilities. However, a significant concern arises from the output escaping. With only 34% of outputs being properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also flags two flows with unsanitized paths, indicating potential for path traversal or similar file system related issues, even though they are not classified as critical or high severity. While the plugin's attack surface appears minimal from the provided metrics (no AJAX handlers, REST API routes, shortcodes, or cron events without auth), the identified output escaping and path issues represent tangible risks that could be exploited if an attacker can trigger these unsanitized paths or trigger unescaped output. The plugin's strength lies in its robust handling of database and authentication mechanisms, but its weakness lies in the inadequate sanitization of outputs and file paths.

Key Concerns

  • Insufficient output escaping (XSS risk)
  • Unsanitized paths in taint flows
Vulnerabilities
None known

Jeero Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Jeero Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
62
32 escaped
Nonce Checks
4
Capability Checks
4
File Operations
9
External Requests
2
Bundled Libraries
0

Output Escaping

34% escaped94 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
get_admin_page_html (includes\Admin\Subscriptions\Subscriptions.php:349)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Jeero Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actionadmin_menuincludes\Admin\Admin.php:7
actionadmin_enqueue_scriptsincludes\Admin\Admin.php:8
actionadmin_enqueue_scriptsincludes\Admin\Debug\Debug.php:4
filterheartbeat_receivedincludes\Admin\Debug\Debug.php:5
actionadmin_noticesincludes\Admin\Notices\Notices.php:13
actionadmin_initincludes\Admin\Settings\Settings.php:10
actionadmin_initincludes\Admin\Subscriptions\Subscriptions.php:36
actionadmin_initincludes\Admin\Subscriptions\Subscriptions.php:37
actionadmin_initincludes\Admin\Subscriptions\Subscriptions.php:38
actionadmin_initincludes\Admin\Subscriptions\Subscriptions.php:39
actionadmin_noticesincludes\Admin\Subscriptions\Subscriptions.php:41
actionadmin_noticesincludes\Admin\Subscriptions\Subscriptions.php:42
actionadmin_enqueue_scriptsincludes\Admin\Templates\Templates.php:4
actionmec_event_publishedincludes\Calendars\Modern_Events_Calendar.php:217
actionwp_headincludes\Footprint\Footprint.php:11
actionadd_meta_boxesincludes\Footprint\Footprint.php:13
filterjeero/inbox/process/item/logincludes\Logs\Logs.php:17
filterjeero/inbox/process/item/statincludes\Logs\Stats.php:17
actioninitincludes\Theaters\Theaters.php:7
actioninitJeero.php:32
Maintenance & Trust

Jeero Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 28, 2026
PHP min version7.2
Downloads10K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Jeero Developer Profile

Jeroen Schmit

5 plugins · 1K total installs

83
trust score
Avg Security Score
93/100
Avg Patch Time
65 days
View full developer profile
Detection Fingerprints

How We Detect Jeero

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jeero/assets/css/admin.css/wp-content/plugins/jeero/assets/js/admin.js
Script Paths
/wp-content/plugins/jeero/assets/js/admin.js/wp-content/plugins/jeero/assets/js/debug.js
Version Parameters
jeero/admin?ver=jeero/debug?ver=

HTML / DOM Fingerprints

CSS Classes
jeero_debug_log
Data Attributes
data-debug_log_slug
JS Globals
jeero_debug_logsjeero_debug
FAQ

Frequently Asked Questions about Jeero