Mega Addons For WPBakery Page Builder Security & Risk Analysis

wordpress.org/plugins/mega-addons-for-visual-composer

34+ Addons WPBakery extension, Beautifully designed unique elements, Includes Premium quality addons For WPBakery Page Builder.

30K active installs v4.3.0 PHP + WP 3.5+ Updated Jan 11, 2024
all-in-one-pluginmega-addons-for-visual-composermega-addons-for-wpbakery-page-buildervisual-composervisual-composer-extension
41
D · High Risk
CVEs total3
Unpatched2
Last CVEApr 17, 2023
Safety Verdict

Is Mega Addons For WPBakery Page Builder Safe to Use in 2026?

High Risk

Score 41/100

Mega Addons For WPBakery Page Builder carries significant security risk with 3 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.

3 known CVEs 2 unpatched Last CVE: Apr 17, 2023Updated 2yr ago
Risk Assessment

The "mega-addons-for-visual-composer" plugin v4.3.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in handling SQL queries using prepared statements and has a very high percentage of properly escaped output. It also reports no dangerous function usage, file operations, or external HTTP requests, and no bundled libraries, which are all favorable security indicators. However, significant concerns arise from the analysis of its entry points and vulnerability history. The presence of one unprotected AJAX handler creates a direct attack vector. While taint analysis did not reveal critical or high severity unsanitized paths, the lack of nonce checks on the identified AJAX handler is a serious omission that could lead to Cross-Site Request Forgery (CSRF) attacks. The plugin's vulnerability history is a major red flag, with 3 known CVEs, 2 of which are currently unpatched and categorized as high severity. These historical vulnerabilities include Cross-site Scripting, Missing Authorization, and CSRF, which directly align with the potential risks identified in the code analysis. The persistent occurrence of these vulnerability types suggests a recurring pattern of insecure coding practices, particularly around input validation and authorization. Despite some strengths in data handling, the presence of unpatched high-severity vulnerabilities and an unprotected entry point makes this plugin a substantial risk.

Key Concerns

  • Unprotected AJAX handler detected
  • Missing nonce checks on AJAX handler
  • 2 unpatched high severity CVEs
  • 1 medium severity CVE
  • Vulnerability history includes XSS, Missing Auth, CSRF
Vulnerabilities
3 published

Mega Addons For WPBakery Page Builder Security Vulnerabilities

CVEs by Year

2 CVEs in 2022 · unpatched
2022
1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

High
2
Medium
1

3 total CVEs

CVE-2023-0268medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mega Addons For WPBakery Page Builder <= 4.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Apr 17, 2023 Patched in 4.3.0 (281d)
CVE-2022-4501high · 7.1Missing Authorization

Mega Addons For WPBakery Page Builder <= 4.3.0 - Authenticated (Subscriber+) Settings Update

Dec 14, 2022Unpatched
CVE-2022-36798high · 8.8Cross-Site Request Forgery (CSRF)

Mega Addons For WPBakery Page Builder <= 4.2.7 - Cross-Site Request Forgery to Settings Update

Sep 2, 2022Unpatched
Code Analysis
Analyzed Mar 16, 2026

Mega Addons For WPBakery Page Builder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
47
4168 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

99% escaped4215 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
vc_saving_data (main.php:87)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Mega Addons For WPBakery Page Builder Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_vc_save_datamain.php:12
WordPress Hooks 7
actionvc_before_initmain.php:10
actionadmin_menumain.php:11
actionwp_enqueue_scriptsmain.php:13
actionadmin_enqueue_scriptsmain.php:14
actioninitmain.php:15
filterplugin_action_linksmain.php:16
actionadmin_noticesmain.php:124
Maintenance & Trust

Mega Addons For WPBakery Page Builder Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedJan 11, 2024
PHP min version
Downloads804K

Community Trust

Rating84/100
Number of ratings57
Active installs30K
Developer Profile

Mega Addons For WPBakery Page Builder Developer Profile

nasir179125

4 plugins · 32K total installs

61
trust score
Avg Security Score
74/100
Avg Patch Time
281 days
View full developer profile
Detection Fingerprints

How We Detect Mega Addons For WPBakery Page Builder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mega-addons-for-visual-composer/css/ihover.css/wp-content/plugins/mega-addons-for-visual-composer/css/style.css/wp-content/plugins/mega-addons-for-visual-composer/css/font-awesome/css/all.css/wp-content/plugins/mega-addons-for-visual-composer/lib/style.css/wp-content/plugins/mega-addons-for-visual-composer/lib/admin.css/wp-content/plugins/mega-addons-for-visual-composer/lib/admin.js
Script Paths
/wp-content/plugins/mega-addons-for-visual-composer/lib/admin.js

HTML / DOM Fingerprints

CSS Classes
addons-admin-wrapmega-addons-versionvc-heading-titlemega-addons-titlevc-heading-icon
HTML Comments
This program is free software; you can redistribute it and/or modifyYou should have received a copy of the GNU General Public License<!-- VC Background -->
Data Attributes
data-vc-shortcode-contentdata-hide-on-mobiledata-hide-on-desktop
JS Globals
window.vc_mega_addons_params
Shortcode Output
[vc_row][vc_column][vc_btn][vc_icon]
FAQ

Frequently Asked Questions about Mega Addons For WPBakery Page Builder