MML Booking Calendar Security & Risk Analysis

wordpress.org/plugins/mml-booking-calendar

MML Booking Calender was created to allow private music teachers to take bookings and payment directly from their website.

10 active installs v1.0.0 PHP 5.2.4+ WP 5.0.2+ Updated Apr 8, 2025
music-lesson-booking-platformmusic-lesson-diarymusic-lessons-booking-calendarmusic-tuition-booking-systemprivate-music-teacher-diary
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MML Booking Calendar Safe to Use in 2026?

Generally Safe

Score 100/100

MML Booking Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12mo ago
Risk Assessment

The "mml-booking-calendar" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points indicates a very limited attack surface. Furthermore, the code signals show no dangerous functions, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are all positive indicators. The taint analysis also yielded no critical or high-severity flows with unsanitized paths.

However, a few areas warrant attention. The 50% rate of properly escaped output suggests that a portion of the plugin's output is not being properly sanitized, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is involved. The complete lack of nonce and capability checks on any entry points, although currently not directly exploitable due to the zero attack surface, represents a potential future risk should new entry points be added without these crucial security measures. The vulnerability history being clean is a positive sign, suggesting a history of secure development, but the lack of checks could expose it if a vulnerability were to arise in the future.

In conclusion, the plugin is currently in a relatively secure state with a minimal attack surface and good practices in SQL handling. The primary concern lies with the unescaped output and the absence of authentication/authorization checks, which are foundational security practices. Addressing these would further solidify the plugin's security.

Key Concerns

  • Output not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

MML Booking Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MML Booking Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

MML Booking Calendar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menumml_booking_calendar.php:13
actionadmin_initmml_booking_calendar.php:36
Maintenance & Trust

MML Booking Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 8, 2025
PHP min version5.2.4
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

MML Booking Calendar Alternatives

No alternatives data available yet.

Developer Profile

MML Booking Calendar Developer Profile

My Music Lessons

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MML Booking Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
name="mml-booking-calendar-iframe"
Shortcode Output
<iframe src="https://mymusiclessons.org.uk/external/diary?key=name="mml-booking-calendar-iframe"width="100%"height="700"
FAQ

Frequently Asked Questions about MML Booking Calendar