Multiple Ajax Calendar Security & Risk Analysis

wordpress.org/plugins/multiple-ajax-calendar

The wordpress calendar widget enhanced to allow multiple instances of it in one page.

20 active installs v2.2 PHP + WP 2.9+ Updated Apr 16, 2014
ajaxcalendarinstancesmultiplewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multiple Ajax Calendar Safe to Use in 2026?

Generally Safe

Score 85/100

Multiple Ajax Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "multiple-ajax-calendar" plugin v2.2 exhibits a mixed security posture. While it demonstrates a lack of known vulnerabilities and a relatively small attack surface with no immediately apparent unprotected entry points in AJAX or REST API, several concerning code signals warrant attention. A significant portion of its SQL queries are not using prepared statements, which is a major risk for SQL injection vulnerabilities. Additionally, the low percentage of properly escaped output suggests a risk of Cross-Site Scripting (XSS) attacks. The single taint flow with unsanitized paths, though not classified as critical or high, indicates a potential pathway for malicious data to be processed without adequate sanitization. The absence of nonce and capability checks, while not directly leading to immediate deductions based on the provided attack surface, represents a missed opportunity for robust authorization and input validation, especially if any future functionality introduces new entry points. The plugin's vulnerability history being clean is a positive indicator, but it doesn't negate the inherent risks identified in the static analysis.

Key Concerns

  • Raw SQL queries without prepared statements
  • Low percentage of output escaping
  • Taint flow with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Multiple Ajax Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Multiple Ajax Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
0 prepared
Unescaped Output
12
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared6 total queries

Output Escaping

57% escaped28 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<multiple-ajax-calendar> (multiple-ajax-calendar.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Multiple Ajax Calendar Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[multiple-ajax-calendar] multiple-ajax-calendar.php:366
WordPress Hooks 2
actiontemplate_redirectmultiple-ajax-calendar.php:23
actionwidgets_initmultiple-ajax-calendar.php:365
Maintenance & Trust

Multiple Ajax Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedApr 16, 2014
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Multiple Ajax Calendar Developer Profile

Xavier Serrano

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multiple Ajax Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/multiple-ajax-calendar/style.css
Version Parameters
multiple-ajax-calendar/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
multiple_ajax_calendar_widgetwp-calendar
Data Attributes
onclick="calendar_AJAX_
JS Globals
calendar_AJAX_jQuery
FAQ

Frequently Asked Questions about Multiple Ajax Calendar