Optix calendar Security & Risk Analysis

wordpress.org/plugins/optix-calendar

Integra nel tuo sito web il calendario di Optix per permettere ai tuoi clienti di prenotare gli appuntamenti in pochi click!

10 active installs v25.05.49 PHP 7.0+ WP 4.0+ Updated Unknown
appointmentappointment-bookingappointment-schedulingbooking-calendaroptician
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Optix calendar Safe to Use in 2026?

Generally Safe

Score 100/100

Optix calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The optix-calendar plugin v25.05.49 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of known CVEs, critical taint flows, dangerous functions, file operations, and external HTTP requests indicates a well-developed and securely coded plugin. Furthermore, all SQL queries are properly prepared, and the plugin does not appear to have a large attack surface or introduce vulnerabilities through bundled libraries.

However, there are a few areas that, while not critical, warrant attention for further hardening. The plugin lacks nonce and capability checks on its entry points, which could potentially be exploited if an attack vector were to be introduced through the shortcode. Additionally, a portion of the output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is rendered without proper sanitization. While the current lack of known vulnerabilities is a significant strength, these minor oversights represent opportunities for improvement to achieve an even more robust security profile.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Unescaped output detected
Vulnerabilities
None known

Optix calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Optix calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

60% escaped5 total outputs
Attack Surface

Optix calendar Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[optix-calendar] optix-calendar.php:28
WordPress Hooks 3
actionwp_enqueue_scriptsoptix-calendar.php:19
actionadmin_menuoptix-calendar.php:22
actionadmin_initoptix-calendar.php:25
Maintenance & Trust

Optix calendar Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedUnknown
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Optix calendar Developer Profile

optixcloud

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Optix calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/optix-calendar/js/optix-calendar.js/wp-content/plugins/optix-calendar/css/optix-calendar.css
Script Paths
https://calendar.optix.cloud/optix-calendar.js

HTML / DOM Fingerprints

Data Attributes
optix-calendar
Shortcode Output
<optix-calendar apikey=
FAQ

Frequently Asked Questions about Optix calendar