Mobile Calendar Booking Engine Security & Risk Analysis

wordpress.org/plugins/mobile-calendar-booking-engine

Official Mobile Calendar booking engine plugin for WordPress. Add booking widgets to your site with Gutenberg blocks and Elementor support.

30 active installs v1.0.0 PHP 7.4+ WP 5.8+ Updated Dec 8, 2025
bookingcalendarhotelpmsreservation
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mobile Calendar Booking Engine Safe to Use in 2026?

Generally Safe

Score 100/100

Mobile Calendar Booking Engine has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The mobile-calendar-booking-engine plugin v1.0.0 exhibits a generally good security posture based on the provided static analysis. The absence of any identified attack surface points, such as unprotected AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces the potential for external exploitation. The plugin also demonstrates an effort towards secure coding practices with a high percentage of properly escaped output and the presence of nonce and capability checks. The lack of any recorded historical vulnerabilities further bolsters this positive assessment.

However, a notable concern arises from the single SQL query identified, which is not using prepared statements. This represents a direct risk of SQL injection vulnerabilities, even if the attack surface appears limited. While taint analysis did not reveal any specific flows, the potential for a malicious actor to exploit this raw SQL query remains. The limited scope of the static analysis (0 flows analyzed) also means that complex or indirect vulnerabilities might have been missed.

In conclusion, the plugin shows strengths in minimizing its attack surface and implementing common security checks. The primary weakness lies in the unparameterized SQL query, which requires immediate attention. While the vulnerability history is clean, this does not negate the inherent risk of the identified coding practice. Addressing the SQL query is crucial to maintaining a robust security profile.

Key Concerns

  • SQL query without prepared statements
Vulnerabilities
None known

Mobile Calendar Booking Engine Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Mobile Calendar Booking Engine Release Timeline

v1.0.0Current
Code Analysis
Analyzed Mar 16, 2026

Mobile Calendar Booking Engine Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
49
196 escaped
Nonce Checks
2
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

80% escaped245 total outputs
Attack Surface

Mobile Calendar Booking Engine Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_menuincludes\class-mcbe-admin.php:23
actionadmin_initincludes\class-mcbe-admin.php:24
actionadmin_enqueue_scriptsincludes\class-mcbe-admin.php:25
actionadmin_post_mcbe_save_tokenincludes\class-mcbe-admin.php:336
actionadmin_post_mcbe_disconnectincludes\class-mcbe-admin.php:337
actioninitincludes\class-mcbe-blocks.php:22
actionenqueue_block_editor_assetsincludes\class-mcbe-blocks.php:23
filterblock_categories_allincludes\class-mcbe-blocks.php:24
actionwp_enqueue_scriptsincludes\class-mcbe-frontend.php:22
actionplugins_loadedmobile-calendar-booking-engine.php:83
actioninitmobile-calendar-booking-engine.php:86
actionelementor/widgets/registermobile-calendar-booking-engine.php:89
actionelementor/elements/categories_registeredmobile-calendar-booking-engine.php:90
Maintenance & Trust

Mobile Calendar Booking Engine Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 8, 2025
PHP min version7.4
Downloads245

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Mobile Calendar Booking Engine Developer Profile

mobilecalendar

1 plugin · 30 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mobile Calendar Booking Engine

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mobile-calendar-booking-engine/assets/css/admin.css/wp-content/plugins/mobile-calendar-booking-engine/assets/js/admin.js/wp-content/plugins/mobile-calendar-booking-engine/assets/css/frontend.css/wp-content/plugins/mobile-calendar-booking-engine/assets/js/frontend.js
Script Paths
/wp-content/plugins/mobile-calendar-booking-engine/assets/js/admin.js/wp-content/plugins/mobile-calendar-booking-engine/assets/js/frontend.js
Version Parameters
mobile-calendar-booking-engine/assets/css/admin.css?ver=mobile-calendar-booking-engine/assets/js/admin.js?ver=mobile-calendar-booking-engine/assets/css/frontend.css?ver=mobile-calendar-booking-engine/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
mcbe-admin-settings-wrapmcbe-frontend-booking-widgetmcbe-booking-buttonmcbe-search-bar
HTML Comments
<!-- Mobile Calendar Booking Engine Admin Page --><!-- Mobile Calendar Booking Engine Frontend Widget --><!-- Mobile Calendar Booking Button --><!-- Mobile Calendar Search Bar -->
Data Attributes
data-mcbe-booking-iddata-mcbe-widget-tokendata-mcbe-api-url
JS Globals
mcbe_admin_paramsmcbe_frontend_params
FAQ

Frequently Asked Questions about Mobile Calendar Booking Engine