Magic Elements Security & Risk Analysis

wordpress.org/plugins/magic-elements

Enhance Elementor with advanced widgets, templates, and features for customizable, stunning designs.

0 active installs v1.0.4 PHP 7.0+ WP 5.0+ Updated Unknown
addonselementorelementor-templateselementor-widgetspage-builder
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Magic Elements Safe to Use in 2026?

Generally Safe

Score 100/100

Magic Elements has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Magic Elements v1.0.4 exhibits a strong security posture based on this static analysis and vulnerability history. The plugin demonstrates good security practices by implementing nonce checks and capability checks for all identified AJAX entry points, and importantly, it has zero unprotected entry points. The use of prepared statements for all SQL queries is excellent, mitigating the risk of SQL injection. Additionally, the high percentage of properly escaped output further reduces the likelihood of cross-site scripting (XSS) vulnerabilities. The absence of file operations and external HTTP requests also limits potential attack vectors.

While the static analysis reveals no critical or high-severity issues in taint analysis, and the plugin has no recorded vulnerabilities, there are minor areas for attention. The capability check is only present on one of the seven AJAX handlers, leaving the other six potentially relying solely on nonce checks, which might not be as robust against all attack scenarios if the nonce generation or validation has subtle flaws. The presence of the Select2 library, while not inherently a vulnerability, means the plugin is dependent on an external component that could, in theory, have its own vulnerabilities in future updates or if bundled with specific configurations.

Overall, Magic Elements v1.0.4 appears to be a well-secured plugin. Its proactive approach to handling AJAX requests and SQL queries is commendable. The lack of historical vulnerabilities further reinforces its good security reputation. The main area for slight improvement would be to ensure robust authorization checks (beyond just nonces) are considered for all AJAX handlers, especially if they handle sensitive operations. However, given the current data, the overall risk is assessed as low.

Key Concerns

  • Capability check missing on 6/7 AJAX handlers
Vulnerabilities
None known

Magic Elements Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Magic Elements Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
62
620 escaped
Nonce Checks
7
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

100% prepared8 total queries

Output Escaping

91% escaped682 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_settings (includes\Admin\Ajax.php:41)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Magic Elements Attack Surface

Entry Points7
Unprotected0

AJAX Handlers 7

authwp_ajax_save_magic_kit_settingsincludes\Admin\Ajax.php:30
authwp_ajax_me_insert_templateincludes\MBuilder\Mbuilder.php:19
authwp_ajax_new_or_update_builder_templateincludes\MBuilder\Mbuilder.php:20
authwp_ajax_me_add_conditionincludes\MBuilder\Mbuilder.php:21
authwp_ajax_me_submit_templateincludes\MBuilder\Mbuilder.php:22
authwp_ajax_me_load_preview_dataincludes\MBuilder\Mbuilder.php:23
authwp_ajax_me_delete_templateincludes\MBuilder\Mbuilder.php:24
WordPress Hooks 14
actionadmin_menuincludes\Admin\Menu.php:33
actionadmin_enqueue_scriptsincludes\Assets.php:20
actionelementor/editor/after_enqueue_stylesincludes\Assets.php:23
actionelementor/elements/categories_registeredincludes\Elementor.php:24
actionelementor/widgets/widgets_registeredincludes\Elementor.php:25
actionelementor/editor/after_enqueue_scriptsincludes\Elementor.php:26
actionwp_enqueue_scriptsincludes\Elementor.php:27
actioninitincludes\MBuilder\Ctp.php:15
actionget_headerincludes\MBuilder\Mbuilder_Frontend.php:45
actionget_footerincludes\MBuilder\Mbuilder_Frontend.php:47
actionmagic_builder_header_contentincludes\MBuilder\Mbuilder_Frontend.php:48
actionmagic_builder_footer_contentincludes\MBuilder\Mbuilder_Frontend.php:49
actionsave_post_me_builderincludes\MBuilder\Mbuilder_Frontend.php:51
actionplugins_loadedmagic-elements.php:49
Maintenance & Trust

Magic Elements Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.0
Downloads696

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Magic Elements Developer Profile

Loyalcoders

3 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Magic Elements

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/magic-elements/assets/dist/admin.css/wp-content/plugins/magic-elements/assets/dist/admin.js/wp-content/plugins/magic-elements/assets/dist/builder.css/wp-content/plugins/magic-elements/assets/vendors/select2/select2.min.css/wp-content/plugins/magic-elements/assets/dist/builder.js/wp-content/plugins/magic-elements/assets/vendors/select2/select2.min.js/wp-content/plugins/magic-elements/assets/css/editor.css
Script Paths
/wp-content/plugins/magic-elements/assets/dist/admin.js/wp-content/plugins/magic-elements/assets/dist/builder.js/wp-content/plugins/magic-elements/assets/vendors/select2/select2.min.js
Version Parameters
magic-elements/style.css?ver=magic-elements/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
magic-elements-editor
JS Globals
me_builder_ajax_object
FAQ

Frequently Asked Questions about Magic Elements