Podamibe Appointment Calendar Security & Risk Analysis

wordpress.org/plugins/podamibe-appointment-calendar

Display your appointment,availability,book date on calendar with various layout and form in more easier and quicker way.

10 active installs v1.1.6 PHP + WP 3.0.1+ Updated May 22, 2019
appointmentavailability-calendarbook-datebook-date-widgetcalendar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Podamibe Appointment Calendar Safe to Use in 2026?

Generally Safe

Score 85/100

Podamibe Appointment Calendar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "podamibe-appointment-calendar" plugin v1.1.6 exhibits several concerning security practices, despite having no recorded historical vulnerabilities. The static analysis reveals a significant attack surface with 3 out of 4 entry points lacking authentication checks. This is particularly worrisome as 100% of the detected SQL queries are not using prepared statements, making them highly susceptible to SQL injection attacks if an unauthenticated user can trigger them. Furthermore, the presence of a taint flow with unsanitized paths, flagged as high severity, indicates a potential for arbitrary code execution or data compromise. The low percentage of properly escaped output (23%) also suggests a risk of Cross-Site Scripting (XSS) vulnerabilities. While the plugin has no known CVEs, the identified weaknesses in authentication, input sanitization, and output escaping create a substantial risk profile. The absence of capability checks on entry points further amplifies these risks.

Key Concerns

  • AJAX handlers without auth checks
  • SQL queries without prepared statements
  • High severity taint flow with unsanitized paths
  • Low percentage of properly escaped output
  • No capability checks on entry points
Vulnerabilities
None known

Podamibe Appointment Calendar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Podamibe Appointment Calendar Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
24
7 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

23% escaped31 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<class-pac-users> (inc\backend\class-pac-users.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
3 unprotected

Podamibe Appointment Calendar Attack Surface

Entry Points4
Unprotected3

AJAX Handlers 3

authwp_ajax_pac_insert_selected_datepac-main.php:66
authwp_ajax_pac_front_form_datapac-main.php:68
noprivwp_ajax_pac_front_form_datapac-main.php:70

Shortcodes 1

[pac_calendar] inc\frontend\class-pac-sc.php:100
WordPress Hooks 8
actionadmin_menupac-main.php:64
actionwidgets_initpac-main.php:72
actionwp_headpac-main.php:74
filterplugin_row_metapac-main.php:76
actionwp_enqueue_scriptspac-main.php:86
actionwp_enqueue_scriptspac-main.php:87
actionadmin_enqueue_scriptspac-main.php:92
actionadmin_enqueue_scriptspac-main.php:93
Maintenance & Trust

Podamibe Appointment Calendar Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedMay 22, 2019
PHP min version
Downloads5K

Community Trust

Rating60/100
Number of ratings4
Active installs10
Developer Profile

Podamibe Appointment Calendar Developer Profile

Podamibe Nepal

8 plugins · 6K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Podamibe Appointment Calendar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/podamibe-appointment-calendar/assets/pac-calendar.css/wp-content/plugins/podamibe-appointment-calendar/assets/pac-front-style.css/wp-content/plugins/podamibe-appointment-calendar/assets/pac-front-style-two.css/wp-content/plugins/podamibe-appointment-calendar/assets/pac-front-style-three.css/wp-content/plugins/podamibe-appointment-calendar/assets/pac-calendar.js/wp-content/plugins/podamibe-appointment-calendar/assets/pac-front.js/wp-content/plugins/podamibe-appointment-calendar/assets/pac-backend-style.css/wp-content/plugins/podamibe-appointment-calendar/assets/pac-extra.js+1 more
Version Parameters
podamibe-appointment-calendar/assets/pac-calendar.css?ver=podamibe-appointment-calendar/assets/pac-front-style.css?ver=podamibe-appointment-calendar/assets/pac-front-style-two.css?ver=podamibe-appointment-calendar/assets/pac-front-style-three.css?ver=podamibe-appointment-calendar/assets/pac-calendar.js?ver=podamibe-appointment-calendar/assets/pac-front.js?ver=podamibe-appointment-calendar/assets/pac-backend-style.css?ver=podamibe-appointment-calendar/assets/pac-extra.js?ver=podamibe-appointment-calendar/assets/pac-color-picker.js?ver=

HTML / DOM Fingerprints

CSS Classes
pac-calendar-wrapper
JS Globals
PAC_TEXT_DOMAINPAC_VERSIONpac_localize_backend_array
FAQ

Frequently Asked Questions about Podamibe Appointment Calendar