Booking System Calendar Security & Risk Analysis

wordpress.org/plugins/kenzap-calendar

Display calendar section for appointments reservations or bookings. Specify custom time slots. Link checkout process with WooCommerce.

10 active installs v1.0.6 PHP 8.0+ WP 5.0+ Updated Nov 1, 2021
appointment-bookingbooking-calendarbooking-systemreservation-calendar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Booking System Calendar Safe to Use in 2026?

Generally Safe

Score 85/100

Booking System Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The kenzap-calendar plugin v1.0.6 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries, performing a reasonable number of capability checks, and avoiding dangerous functions and file operations. The absence of known CVEs and bundled libraries is also encouraging, suggesting a relatively clean history and development approach.

However, a significant concern arises from the presence of four AJAX handlers that lack authentication checks. This creates a substantial attack surface, as any unauthenticated user could potentially interact with these endpoints, leading to unintended actions. While the taint analysis did not reveal critical or high-severity unsanitized paths, the fact that all four analyzed flows had unsanitized paths is a red flag, even if they didn't escalate to critical levels in this specific analysis. The 80% output escaping rate, while good, also means 20% of outputs are not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if those unescaped outputs are user-controllable.

Overall, the plugin has strengths in its SQL handling and lack of historical vulnerabilities. However, the unprotected AJAX endpoints and the presence of unsanitized flows within the taint analysis present a clear and immediate risk. Addressing these unprotected entry points should be a priority to improve the plugin's security.

Key Concerns

  • 4 AJAX handlers without auth checks
  • 4 unsanitized paths in taint flows
  • 20% of outputs not properly escaped
Vulnerabilities
None known

Booking System Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Booking System Calendar Release Timeline

v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Booking System Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
34
136 escaped
Nonce Checks
4
Capability Checks
10
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped170 total outputs
Data Flows · Security
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
kenzap_calendar_get_dates (src\calendar-1\block-ajax-init.php:14)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Booking System Calendar Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

noprivwp_ajax_kenzap_calendar_get_datessrc\calendar-1\block-ajax-init.php:11
authwp_ajax_kenzap_calendar_get_datessrc\calendar-1\block-ajax-init.php:12
noprivwp_ajax_kenzap_calendar_get_productsrc\calendar-1\block-ajax-init.php:26
authwp_ajax_kenzap_calendar_get_productsrc\calendar-1\block-ajax-init.php:27
WordPress Hooks 39
actiontgmpa_registerinc\class-plugins.php:7
actioninitinc\class-tgm-plugin-activation.php:276
actionadmin_menuinc\class-tgm-plugin-activation.php:423
actionadmin_headinc\class-tgm-plugin-activation.php:424
filterinstall_plugin_complete_actionsinc\class-tgm-plugin-activation.php:427
filterupdate_plugin_complete_actionsinc\class-tgm-plugin-activation.php:428
actionadmin_noticesinc\class-tgm-plugin-activation.php:431
actionadmin_initinc\class-tgm-plugin-activation.php:432
actionadmin_enqueue_scriptsinc\class-tgm-plugin-activation.php:433
actionload-plugins.phpinc\class-tgm-plugin-activation.php:438
actionswitch_themeinc\class-tgm-plugin-activation.php:441
actionswitch_themeinc\class-tgm-plugin-activation.php:444
actionadmin_initinc\class-tgm-plugin-activation.php:449
actionswitch_themeinc\class-tgm-plugin-activation.php:454
filterupgrader_source_selectioninc\class-tgm-plugin-activation.php:803
actionplugins_loadedinc\class-tgm-plugin-activation.php:1919
filtertgmpa_table_data_itemsinc\class-tgm-plugin-activation.php:2043
filterupgrader_source_selectioninc\class-tgm-plugin-activation.php:2770
actionadmin_initinc\class-tgm-plugin-activation.php:2930
actionupgrader_process_completeinc\class-tgm-plugin-activation.php:3025
filterupgrader_post_installinc\class-tgm-plugin-activation.php:3082
filterupgrader_post_installinc\class-tgm-plugin-activation.php:3224
filterwoocommerce_add_cart_item_datainc\class-woocommerce.php:17
filterwoocommerce_get_item_datainc\class-woocommerce.php:36
filterwoocommerce_get_cart_item_from_sessioninc\class-woocommerce.php:50
actionwoocommerce_new_order_iteminc\class-woocommerce.php:60
filterwoocommerce_endpoint_order-received_titleinc\class-woocommerce.php:71
filterwoocommerce_thankyou_order_received_textinc\class-woocommerce.php:84
actionwoocommerce_thankyouinc\class-woocommerce.php:141
actionwoocommerce_order_status_changedinc\class-woocommerce.php:188
actionadmin_initplugin.php:53
actionadmin_noticesplugin.php:54
actioninitsrc\calendar-1\init.php:150
actioninitsrc\init.php:24
filterbody_classsrc\init.php:32
filteradmin_body_classsrc\init.php:33
actionenqueue_block_assetssrc\init.php:53
actionenqueue_block_editor_assetssrc\init.php:92
actionthe_postsrc\init.php:126
Maintenance & Trust

Booking System Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 1, 2021
PHP min version8.0
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Booking System Calendar Developer Profile

WP Asia

10 plugins · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Booking System Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kenzap-calendar/css/kenzap-calendar.css/wp-content/plugins/kenzap-calendar/js/kenzap-calendar.js/wp-content/plugins/kenzap-calendar/js/jquery.min.js/wp-content/plugins/kenzap-calendar/js/jquery-ui.min.js/wp-content/plugins/kenzap-calendar/css/jquery-ui.min.css
Script Paths
/wp-content/plugins/kenzap-calendar/js/kenzap-calendar.js/wp-content/plugins/kenzap-calendar/js/jquery.min.js/wp-content/plugins/kenzap-calendar/js/jquery-ui.min.js
Version Parameters
kenzap-calendar/css/kenzap-calendar.css?ver=kenzap-calendar/js/kenzap-calendar.js?ver=kenzap-calendar/js/jquery.min.js?ver=kenzap-calendar/js/jquery-ui.min.js?ver=kenzap-calendar/css/jquery-ui.min.css?ver=

HTML / DOM Fingerprints

CSS Classes
kenzap-calendar-wrapperkenzap-calendar-containerkenzap-calendar-event-listkenzap-calendar-event-item
Data Attributes
data-kenzap-calendar-id
JS Globals
KenzapCalendar
Shortcode Output
[kenzap_calendar]
FAQ

Frequently Asked Questions about Booking System Calendar