Weaver II to Weaver Xtreme Security & Risk Analysis

wordpress.org/plugins/weaver-ii-to-weaver-xtreme

Weaver II to Weaver Xtreme Settings Converter

300 active installs v1.1 PHP + WP 4.5+ Updated May 13, 2018
weaver-plugins
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Weaver II to Weaver Xtreme Safe to Use in 2026?

Generally Safe

Score 85/100

Weaver II to Weaver Xtreme has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin 'weaver-ii-to-weaver-xtreme' v1.1 exhibits a mixed security posture. On one hand, it demonstrates several good security practices. Notably, there are no recorded vulnerabilities (CVEs), suggesting a generally stable history. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's external attack surface, and all SQL queries are secured with prepared statements. Furthermore, the plugin incorporates nonce and capability checks.

However, the static analysis reveals concerning areas. The presence of the `unserialize` function is a significant risk. If user-controlled input is passed to this function without proper sanitization, it can lead to Remote Code Execution (RCE) vulnerabilities. While the taint analysis shows only one flow with unsanitized paths and no critical or high severity issues, the mere presence of `unserialize` is a red flag that warrants careful attention and robust input validation. The low percentage of properly escaped output (13%) is another concern, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities, especially if any of the unsanitized flows could lead to output.

Overall, the plugin's limited attack surface and good history are strengths. However, the identified use of `unserialize` and the poor output escaping practices introduce significant potential risks that should be addressed to improve the plugin's security. It is crucial to ensure that any data passed to `unserialize` is thoroughly validated and that output escaping is implemented consistently.

Key Concerns

  • Dangerous function 'unserialize' used
  • Low percentage of output properly escaped
  • Flow with unsanitized path
Vulnerabilities
None known

Weaver II to Weaver Xtreme Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Weaver II to Weaver Xtreme Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
46
7 escaped
Nonce Checks
2
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$wii_settings = unserialize(substr($wii,10));includes\wii2wx_admin.php:367
unserialize$restore = unserialize(substr($contents,10));includes\wii2wx_admin.php:894

Output Escaping

13% escaped53 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
wii2wx_admin_tab1 (includes\wii2wx_admin.php:76)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Weaver II to Weaver Xtreme Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuwii2wx_core.php:12
actionwp_enqueue_scriptswii2wx_core.php:42
Maintenance & Trust

Weaver II to Weaver Xtreme Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 13, 2018
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs300
Alternatives

Weaver II to Weaver Xtreme Alternatives

No alternatives data available yet.

Developer Profile

Weaver II to Weaver Xtreme Developer Profile

wpweaver

6 plugins · 20K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
158 days
View full developer profile
Detection Fingerprints

How We Detect Weaver II to Weaver Xtreme

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/weaver-ii-to-weaver-xtreme/wii2wx_admin_style.css/wp-content/plugins/weaver-ii-to-weaver-xtreme/wii2wx_style.css
Script Paths
/wp-content/plugins/weaver-ii-to-weaver-xtreme/js/yetii.js
Version Parameters
weaver-ii-to-weaver-xtreme/wii2wx_admin_style.css?ver=weaver-ii-to-weaver-xtreme/wii2wx_style.css?ver=weaver-ii-to-weaver-xtreme/js/yetii.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Weaver II to Weaver Xtreme