Weaver Xtreme Theme Support Security & Risk Analysis

wordpress.org/plugins/weaverx-theme-support

A useful shortcode and widget collection for Weaver Xtreme

9K active installs v6.5.1 PHP 7.2+ WP 6.0+ Updated May 31, 2024
shortcodesweaver-xtreme-themewidgets
89
A · Safe
CVEs total3
Unpatched0
Last CVEJun 4, 2024
Safety Verdict

Is Weaver Xtreme Theme Support Safe to Use in 2026?

Generally Safe

Score 89/100

Weaver Xtreme Theme Support has a strong security track record. Known vulnerabilities have been patched promptly.

3 known CVEsLast CVE: Jun 4, 2024Updated 1yr ago
Risk Assessment

The weaverx-theme-support plugin v6.5.1 presents a mixed security posture. While the static analysis shows no direct attack surface through AJAX, REST API, shortcodes, or cron events, and all SQL queries utilize prepared statements, there are significant underlying concerns. The presence of two dangerous `unserialize` functions is a major red flag, especially when combined with a high number of taint flows with unsanitized paths, including three of high severity. This indicates a strong potential for deserialization vulnerabilities if external data is not meticulously sanitized before being passed to these functions.

The vulnerability history reveals a pattern of past security issues, including Deserialization of Untrusted Data and Cross-site Scripting. The fact that a high-severity vulnerability was patched very recently (2024-06-04) suggests that the plugin, despite recent updates, has historically been susceptible to critical flaws. The total number of known CVEs (3) also indicates a history of security weaknesses that require ongoing attention and rigorous security practices from developers.

In conclusion, while the plugin's current version lacks immediately exposed entry points for attackers and employs secure SQL practices, the inherent risk associated with deserialization functions and the historical vulnerability patterns necessitate caution. The high number of unsanitized taint flows is a critical area of concern that could lead to severe exploits if not addressed comprehensively. Developers should prioritize thorough input validation and sanitization, particularly around `unserialize` calls, and continue to monitor for and address security vulnerabilities promptly.

Key Concerns

  • Dangerous function: unserialize
  • Taint flows with unsanitized paths (High severity)
  • Vulnerability history: Deserialization of Untrusted Data
  • Vulnerability history: Cross-site Scripting
  • Recent high severity vulnerability patched
  • Moderate output escaping (62% properly escaped)
  • No nonce checks
Vulnerabilities
3

Weaver Xtreme Theme Support Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
2

3 total CVEs

CVE-2024-4939medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Weaver Xtreme Theme Support <= 6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via div Shortcode

Jun 4, 2024 Patched in 6.5 (1d)
CVE-2023-4971high · 7.2Deserialization of Untrusted Data

Weaver Xtreme Theme Support <= 6.3.0 - Authenticated (Administrator+) PHP Object Injection via Imported File

Sep 19, 2023 Patched in 6.3.1 (126d)
CVE-2023-0276medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Weaver Xtreme Theme Support <= 6.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Mar 11, 2023 Patched in 6.2.7 (318d)
Code Analysis
Analyzed Mar 16, 2026

Weaver Xtreme Theme Support Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
162
269 escaped
Nonce Checks
0
Capability Checks
10
File Operations
9
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$restore = unserialize(substr($contents, 10));admin\admin-lib-ts.php:145
unserialize$restore = unserialize(substr($contents, 10));admin\admin-lib-ts.php:811

Output Escaping

62% escaped431 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

7 flows6 with unsanitized paths
weaverx_saverestore (admin\admin-saverestore4.php:130)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Weaver Xtreme Theme Support Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
actionadmin_headadmin\add-weaverx-sapi-options.php:11
actionweaverx_admin_saverestoreadmin\add-weaverx-sapi-options.php:18
actionweaverx_admin_subthemesadmin\add-weaverx-sapi-options.php:19
actionweaverx_admin_mainoptsadmin\add-weaverx-sapi-options.php:20
actionweaverx_admin_advancedoptsadmin\add-weaverx-sapi-options.php:21
actionweaverx_save_mcecssincludes\wvrx-ts-editor-style.php:74
actionweaverx_save_gutenberg_cssincludes\wvrx-ts-editor-style.php:81
filterweaverx_mce_cssincludes\wvrx-ts-editor-style.php:625
filterwidget_textincludes\wvrx-ts-runtime-lib.php:18
actionweaverx_theme_support_addonincludes\wvrx-ts-runtime-lib.php:35
actionweaverx_more_helpincludes\wvrx-ts-runtime-lib.php:198
actionweaverx_ts_show_versionincludes\wvrx-ts-runtime-lib.php:234
actioninitincludes\wvrx-ts-shortcodes.php:39
actionwidgets_initincludes\wvrx-ts-widgets.php:453
filterweaverx_textincludes\wvrx-ts-widgets.php:454
filterwidget_textincludes\wvrx-ts-widgets.php:455
actionwp_enqueue_scriptsweaverx-ts.php:83
actionweaver_xtreme_load_adminweaverx-ts.php:98
actionweaverx_child_show_extrathemesweaverx-ts.php:102
actionweaverx_child_process_optionsweaverx-ts.php:109
actionweaverx_child_saverestoreweaverx-ts.php:131
actionplugins_loadedweaverx-ts.php:273
Maintenance & Trust

Weaver Xtreme Theme Support Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 31, 2024
PHP min version7.2
Downloads383K

Community Trust

Rating100/100
Number of ratings4
Active installs9K
Developer Profile

Weaver Xtreme Theme Support Developer Profile

wpweaver

6 plugins · 20K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
158 days
View full developer profile
Detection Fingerprints

How We Detect Weaver Xtreme Theme Support

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Weaver Xtreme Theme Support