Unicon extensions Security & Risk Analysis

wordpress.org/plugins/unicon-extensions

support for special content types in your website, such as a service Block, client, and team member.

70 active installs v1.0.5 PHP + WP 4.7+ Updated Aug 17, 2017
clientsteam-memberswidgetwidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Unicon extensions Safe to Use in 2026?

Generally Safe

Score 85/100

Unicon extensions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of the "unicon-extensions" v1.0.5 plugin reveals a generally positive security posture. The plugin exhibits a clean attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points were identified. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its secure design.

However, a significant concern arises from the presence of a single SQL query that does not utilize prepared statements. This could potentially expose the plugin to SQL injection vulnerabilities if the data used in the query is not rigorously sanitized. Additionally, a low percentage (29%) of proper output escaping is a considerable weakness, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks on any entry points, coupled with only one capability check present, indicates a potential reliance on other security mechanisms or a simplified security model that may not be robust enough in all scenarios.

Furthermore, the plugin has no recorded vulnerability history, which is a strong positive indicator. This suggests either diligent development practices, a lack of past exploitable flaws, or potentially that the plugin has not been extensively targeted or analyzed. Despite the strengths in attack surface management and lack of historical vulnerabilities, the identified raw SQL query and significant output escaping issues warrant attention to mitigate potential security risks.

Key Concerns

  • SQL query without prepared statements
  • Low percentage of properly escaped output
  • No nonce checks found
Vulnerabilities
None known

Unicon extensions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Unicon extensions Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
489
195 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

29% escaped684 total outputs
Attack Surface

Unicon extensions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterpt-ocdi/import_filesinc\demo.php:30
actionadmin_enqueue_scriptsunicon-extensions.php:34
actionwidgets_initunicon-extensions.php:220
Maintenance & Trust

Unicon extensions Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedAug 17, 2017
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Unicon extensions Developer Profile

themezwp

3 plugins · 140 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Unicon extensions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/unicon-extensions/assets/js/unicon_widgets_custom_css.css
Script Paths
/wp-content/plugins/unicon-extensions/assets/js/widget-media.js
Version Parameters
unicon-extensions/assets/js/unicon_widgets_custom_css.css?ver=unicon-extensions/assets/js/widget-media.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Unicon extensions