Universal Control for TaHoma Security & Risk Analysis

wordpress.org/plugins/universal-control-for-tahoma

Universal Gutenberg block to control Somfy TaHoma devices worldwide via Cloud API.

0 active installs v1.0.4 PHP 7.4+ WP 5.8+ Updated Jan 8, 2026
automationoverkizsmart-homesomfytahoma
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Universal Control for TaHoma Safe to Use in 2026?

Generally Safe

Score 100/100

Universal Control for TaHoma has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The plugin "universal-control-for-tahoma" v1.0.4 exhibits a generally strong security posture based on the provided static analysis. All identified entry points, including AJAX handlers and REST API routes, appear to be protected by capability checks, which is a significant positive. The code also demonstrates good practices with 100% of SQL queries using prepared statements and a high percentage (91%) of output properly escaped, minimizing risks of SQL injection and XSS vulnerabilities. There are no recorded vulnerability histories, suggesting a history of secure development or a lack of public disclosure, which is a favorable sign. The absence of dangerous functions, file operations, and critical taint flows further strengthens its security profile.

However, a few areas warrant attention. The plugin makes an external HTTP request, which, while not inherently a vulnerability, introduces a potential point of failure or data leakage if the external endpoint is compromised or insecure. The lack of nonce checks on AJAX handlers, though the analysis states there are zero unprotected AJAX handlers, is still a potential concern if the capability checks are not sufficiently granular or if there's a misunderstanding in the analysis regarding AJAX endpoints. The total attack surface is small, but the fact that 0 out of 3 REST API routes have permission callbacks specified could indicate an oversight in the analysis or a configuration issue where these routes might be accessible without proper authorization checks, despite the overall count of unprotected entry points being zero. These minor concerns do not negate the overall positive assessment but suggest a need for continued vigilance in maintaining security.

Key Concerns

  • External HTTP requests made
  • REST API routes without explicit permission callbacks
  • Nonce checks missing on AJAX handlers (despite being protected)
Vulnerabilities
None known

Universal Control for TaHoma Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Universal Control for TaHoma Release Timeline

v1.0.4Current
Code Analysis
Analyzed Mar 17, 2026

Universal Control for TaHoma Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
10 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

91% escaped11 total outputs
Attack Surface

Universal Control for TaHoma Attack Surface

Entry Points3
Unprotected0

REST API Routes 3

POST/wp-json/tahoma/v1/fetch-devicesuniversal-control-for-tahoma.php:129
POST/wp-json/tahoma/v1/executeuniversal-control-for-tahoma.php:137
POST/wp-json/tahoma/v1/statusuniversal-control-for-tahoma.php:145
WordPress Hooks 6
actioninituniversal-control-for-tahoma.php:44
actionadmin_menuuniversal-control-for-tahoma.php:47
actionadmin_inituniversal-control-for-tahoma.php:74
actionenqueue_block_editor_assetsuniversal-control-for-tahoma.php:111
actioninituniversal-control-for-tahoma.php:124
actionrest_api_inituniversal-control-for-tahoma.php:128
Maintenance & Trust

Universal Control for TaHoma Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 8, 2026
PHP min version7.4
Downloads126

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Universal Control for TaHoma Developer Profile

globus2008

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Universal Control for TaHoma

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/universal-control-for-tahoma/build/index.js/wp-content/plugins/universal-control-for-tahoma/build/style-index.css
Script Paths
/wp-content/plugins/universal-control-for-tahoma/build/index.js
Version Parameters
universal-control-for-tahoma/build/index.js?ver=universal-control-for-tahoma/build/style-index.css?ver=

HTML / DOM Fingerprints

CSS Classes
tahoma-global-settings
Data Attributes
name="tahoma_global_email"name="tahoma_global_password"name="tahoma_global_server"value="www.tahomalink.com"value="ha101-1.overkiz.com"
JS Globals
tahomaGlobal
REST Endpoints
/wp-json/tahoma/v1/fetch-devices/wp-json/tahoma/v1/execute/wp-json/tahoma/v1/status
FAQ

Frequently Asked Questions about Universal Control for TaHoma