
Understory Security & Risk Analysis
wordpress.org/plugins/understoryConnect your Understory account with WordPress, to easily add Booking and Experience Widgets to your pages!
Is Understory Safe to Use in 2026?
Generally Safe
Score 100/100Understory has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The understory plugin v1.8.3 exhibits a mixed security posture. On the positive side, it demonstrates excellent practices regarding SQL queries and output escaping, with 100% of both being handled securely. The absence of known CVEs and any recorded vulnerabilities in its history is a strong indicator of responsible development and maintenance. Furthermore, the plugin does not utilize bundled libraries, reducing the risk of outdated components.
However, there are notable areas of concern. The plugin has a total of 10 entry points, with a significant portion (4) of these being AJAX handlers that lack authentication checks. This creates a substantial attack surface that is potentially exposed to unauthenticated users. While the plugin has nonce checks for its AJAX handlers, the lack of capability checks on these vulnerable AJAX endpoints means that any authenticated user, regardless of their role or permissions, could trigger these functions. The two external HTTP requests, while not inherently problematic without further context, represent a potential vector for further exploitation if not handled with extreme care.
In conclusion, while the plugin's handling of core security aspects like SQL and output escaping is commendable, the presence of unprotected AJAX endpoints is a critical weakness. This significantly elevates the risk profile. The lack of historical vulnerabilities is a positive sign but does not negate the current identified security flaws. Addressing the unprotected AJAX handlers should be the highest priority to improve the overall security of the plugin.
Key Concerns
- AJAX handlers without authentication checks
- AJAX handlers without capability checks
- External HTTP requests
Understory Security Vulnerabilities
Understory Code Analysis
Output Escaping
Understory Attack Surface
AJAX Handlers 6
Shortcodes 4
WordPress Hooks 32
Maintenance & Trust
Understory Maintenance & Trust
Maintenance Signals
Community Trust
Understory Alternatives
Rezgo Online Booking
rezgo
Sell your tours, activities, and events on your WordPress website using Rezgo.
BA Book Everything
ba-book-everything
The really fast and powerful Booking engine for theme/site developers to create any booking or rental sites (tours, cars, events, apartments, yachts)
indexic aReservation
indexic-areservation
Easily integrate Indexic's aReservation Tour Booking and Rental Reservation Software into your WordPress website. You can add booking buttons wi …
ZOOZA
zooza
This plugin enables integration of Zooza widgets to your website. An existing Zooza account is required for this plugin to work.
WP Travel MapQuest
wp-travel-mapquest
A simple map addon to WP Travel plugin which can be used in place of Google Map.
Understory Developer Profile
1 plugin · 90 total installs
How We Detect Understory
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/understory/assets/css/admin.css/wp-content/plugins/understory/assets/js/admin.jsunderstory/style.css?ver=understory/admin.css?ver=understory/admin.js?ver=HTML / DOM Fingerprints
understory-settings-pagedata-understory-company-iddata-understory-storefront-idUnderstory[understory_booking][understory_gift_card]