Shamor Security & Risk Analysis

wordpress.org/plugins/shamor

Redirect user out of your site on Shabbat and Holiday.

400 active installs v1.8.3 PHP 5.3+ WP 2.0+ Updated Oct 23, 2025
jewishshabbat
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Shamor Safe to Use in 2026?

Generally Safe

Score 100/100

Shamor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The "shamor" plugin version 1.8.3 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries, utilizing prepared statements exclusively, and has no recorded vulnerabilities (CVEs) or active security advisories. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its current stable state. However, significant concerns arise from the attack surface analysis. Two AJAX handlers are present, and alarmingly, both lack authentication checks. This creates a direct pathway for unauthenticated users to interact with potentially sensitive plugin functionalities, posing a notable risk. The taint analysis also shows no flows analyzed, which, while not indicating a problem, means this aspect of security hasn't been thoroughly vetted.

Despite the lack of a known vulnerability history, the presence of unprotected AJAX endpoints is a critical weakness that could be exploited. The plugin's strengths lie in its SQL handling and lack of known past issues, but the immediate risk of unauthenticated access to AJAX endpoints cannot be overlooked. A balanced conclusion suggests that while the plugin has avoided historical vulnerabilities and employs good database practices, its current implementation introduces a significant and immediate security concern due to the exposed AJAX handlers. Further security auditing, particularly around taint analysis and output escaping, would be beneficial.

Key Concerns

  • Unprotected AJAX handlers
  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Shamor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Shamor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped14 total outputs
Attack Surface
2 unprotected

Shamor Attack Surface

Entry Points4
Unprotected2

AJAX Handlers 2

authwp_ajax_validate_wp_shammorwp-shamor.php:37
noprivwp_ajax_validate_wp_shammorwp-shamor.php:38

Shortcodes 2

[wp_shammor_countdown] wp-shamor.php:39
[wp_shamor_havdalah_hour] wp-shamor.php:40
WordPress Hooks 8
actionadmin_noticeswp-shamor.php:29
filtertemplate_includewp-shamor.php:33
filterstatus_headerwp-shamor.php:34
actionadmin_menuwp-shamor.php:35
actionwp_enqueue_scriptswp-shamor.php:36
actionwp_enqueue_scriptswp-shamor.php:179
actionwp_enqueue_scriptswp-shamor.php:205
actionadmin_initwp-shamor.php:260
Maintenance & Trust

Shamor Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedOct 23, 2025
PHP min version5.3
Downloads4K

Community Trust

Rating100/100
Number of ratings4
Active installs400
Developer Profile

Shamor Developer Profile

Shamor Team

1 plugin · 400 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Shamor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shamor/block_template.php

HTML / DOM Fingerprints

Shortcode Output
<div class="wp-shammor-countdown-container"></div><div class="wp-shamor-havdalah-hour-container"></div>
FAQ

Frequently Asked Questions about Shamor