Sequel Security & Risk Analysis

wordpress.org/plugins/sequel

Turn your WordPress website into a virtual or hybrid live engagement platform, powered by Sequel.io

40 active installs v1.0.16 PHP 7.4+ WP 5.0+ Updated Feb 5, 2026
eventsnetworkingvideo-conferencingvirtual-eventswebinars
99
A · Safe
CVEs total1
Unpatched0
Last CVEApr 2, 2025
Safety Verdict

Is Sequel Safe to Use in 2026?

Generally Safe

Score 99/100

Sequel has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 2, 2025Updated 1mo ago
Risk Assessment

The 'sequel' plugin v1.0.16 exhibits a strong security posture based on the provided static analysis. The complete absence of dangerous functions, external HTTP requests, file operations, and the exclusive use of prepared statements for SQL queries are commendable practices. Furthermore, the perfect record of output escaping indicates a low risk of cross-site scripting vulnerabilities stemming directly from the code's output handling. The lack of identified taint flows, particularly those of critical or high severity, reinforces the impression of a securely coded plugin in these areas.

However, the plugin's vulnerability history presents a significant concern. The presence of one known CVE, even though currently patched, points to past security weaknesses. The nature of the common vulnerability type being Cross-site Scripting (XSS) is particularly worrying. While the last vulnerability was in the future (2025-04-02), suggesting a potential data entry error in the provided history, it's crucial to acknowledge that past XSS vulnerabilities in a plugin, regardless of current patch status, warrant vigilance. The static analysis does not reveal the specific reason for the historical CVE, but it is a critical piece of information that cannot be ignored when assessing the overall risk.

In conclusion, while the current codebase appears robust in its implementation of secure coding practices like prepared statements and output escaping, the historical vulnerability to XSS is a notable weakness. The absence of any explicit capability checks or nonce checks on the identified entry points (shortcodes) could also be a point of concern if these shortcodes handle sensitive data or actions. Further investigation into the specifics of the past CVE and the functionality of the shortcodes is recommended for a complete risk picture.

Key Concerns

  • Historical CVE found
  • Past vulnerability type: XSS
  • Missing capability checks on entry points
  • Missing nonce checks on entry points
Vulnerabilities
1

Sequel Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31389medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Sequel <= 1.0.11 - Reflected Cross-Site Scripting

Apr 2, 2025 Patched in 1.0.13 (331d)
Code Analysis
Analyzed Mar 16, 2026

Sequel Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Sequel Attack Surface

Entry Points5
Unprotected0

Shortcodes 5

[introvoke_mingle] sequel.php:85
[sequel_networking_hub] sequel.php:86
[introvoke_event] sequel.php:127
[sequel_event] sequel.php:128
[IntrovokeEvent] sequel.php:129
WordPress Hooks 4
actionplugins_loadedincludes\class-introvoke.php:134
actionwp_enqueue_scriptsincludes\class-introvoke.php:149
actionwp_enqueue_scriptsincludes\class-introvoke.php:150
actionwp_dashboard_setupsequel.php:34
Maintenance & Trust

Sequel Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedFeb 5, 2026
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Sequel Developer Profile

Introvoke Inc. dba Sequel.io

1 plugin · 40 total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
331 days
View full developer profile
Detection Fingerprints

How We Detect Sequel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
introvoke-iframe
JS Globals
Introvoke
Shortcode Output
<iframe id="sequel116"<iframe id="sequel116" border="0" class="introvoke-iframe" src="https://embed.sequel.io/networkingHub/<iframe id="sequel116" border="0" class="introvoke-iframe" src="https://embed.sequel.io/event/var iframes = document.querySelectorAll("#sequel116");
FAQ

Frequently Asked Questions about Sequel