Visidea Security & Risk Analysis

wordpress.org/plugins/visidea

Visidea is the Visual Search, Search Bar and Product Recommendations plugin for WooCommerce.

10 active installs v2.1.40 PHP 7.0+ WP 4.7+ Updated Mar 5, 2026
barrecommendationrecommendationssearchvisual
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Visidea Safe to Use in 2026?

Generally Safe

Score 100/100

Visidea has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The plugin "visidea" v2.1.40 exhibits a generally strong security posture based on the provided static analysis. The complete absence of dangerous functions, 100% usage of prepared statements for SQL queries, and a good percentage of properly escaped output are all positive indicators. Furthermore, the lack of any recorded vulnerabilities in its history suggests a history of responsible development and patching. The attack surface is also minimal, with no unprotected entry points identified.

However, there are a few areas that warrant attention. The absence of any nonce checks is a concern, especially given the presence of shortcodes which could potentially be leveraged in cross-site scripting (XSS) attacks if not properly secured. While no specific taint flows were detected, the lack of nonces could make it easier for an attacker to inject malicious input that isn't properly validated. The significant number of file operations without a clear indication of their purpose or security controls could also represent a potential risk if any of these operations are mishandled. The limited number of entry points is a strength, but the lack of protective checks on them, particularly nonces, is a weakness.

In conclusion, "visidea" v2.1.40 appears to be a relatively secure plugin with good coding practices in place for database interactions and output handling. Its vulnerability history is commendable. The primary concern lies in the absence of nonce checks, which could potentially expose it to certain types of attacks, especially when combined with file operations. Addressing this would further enhance its security.

Key Concerns

  • Missing nonce checks
  • File operations without clear security controls
Vulnerabilities
None known

Visidea Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Visidea Release Timeline

v2.1.40Current
v2.1.39
v2.1.38
v2.1.37
v2.1.36
v2.1.35
v2.1.34
v2.1.33
v2.1.32
v2.1.31
v2.1.30
v2.1.29
v2.1.28
v2.1.27
v2.1.26
v2.1.25
v2.1.24
v2.1.23
v2.1.22
v2.1.21
Code Analysis
Analyzed Mar 17, 2026

Visidea Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
37
86 escaped
Nonce Checks
0
Capability Checks
0
File Operations
25
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

70% escaped123 total outputs
Attack Surface

Visidea Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[visidea_recommendations] includes\class-visidea.php:132
[visidea_recommendation] includes\class-visidea.php:134
WordPress Hooks 12
actionwp_enqueue_scriptsincludes\class-visidea.php:124
filterthe_contentincludes\class-visidea.php:126
actionwoocommerce_after_single_product_summaryincludes\class-visidea.php:128
actionwp_body_openincludes\class-visidea.php:130
actionadmin_menuincludes\class-visidea.php:155
actionadmin_initincludes\class-visidea.php:156
actioninitincludes\class-visidea.php:158
actionvisidea_export_data_jobvisidea.php:78
actionvisidea_export_items_jobvisidea.php:84
actionvisidea_export_users_jobvisidea.php:90
actionvisidea_export_interactions_jobvisidea.php:96
actionplugins_loadedvisidea.php:98
Maintenance & Trust

Visidea Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMar 5, 2026
PHP min version7.0
Downloads5K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Visidea Developer Profile

Visidea

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Visidea

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/visidea/public/js/visidea-public.js/wp-content/plugins/visidea/public/css/visidea-public.css
Script Paths
/wp-content/plugins/visidea/public/js/visidea-public.js
Version Parameters
visidea-public.js?ver=visidea-public.css?ver=

HTML / DOM Fingerprints

CSS Classes
visidea-recommendationsvisidea-recommendation
Data Attributes
data-visidea-id
JS Globals
visidea_params
Shortcode Output
[visidea_recommendations][visidea_recommendation]
FAQ

Frequently Asked Questions about Visidea