
Weaver Xtreme Theme Support Security & Risk Analysis
wordpress.org/plugins/weaverx-theme-supportA useful shortcode and widget collection for Weaver Xtreme
Is Weaver Xtreme Theme Support Safe to Use in 2026?
Generally Safe
Score 89/100Weaver Xtreme Theme Support has a strong security track record. Known vulnerabilities have been patched promptly.
The weaverx-theme-support plugin v6.5.1 presents a mixed security posture. While the static analysis shows no direct attack surface through AJAX, REST API, shortcodes, or cron events, and all SQL queries utilize prepared statements, there are significant underlying concerns. The presence of two dangerous `unserialize` functions is a major red flag, especially when combined with a high number of taint flows with unsanitized paths, including three of high severity. This indicates a strong potential for deserialization vulnerabilities if external data is not meticulously sanitized before being passed to these functions.
The vulnerability history reveals a pattern of past security issues, including Deserialization of Untrusted Data and Cross-site Scripting. The fact that a high-severity vulnerability was patched very recently (2024-06-04) suggests that the plugin, despite recent updates, has historically been susceptible to critical flaws. The total number of known CVEs (3) also indicates a history of security weaknesses that require ongoing attention and rigorous security practices from developers.
In conclusion, while the plugin's current version lacks immediately exposed entry points for attackers and employs secure SQL practices, the inherent risk associated with deserialization functions and the historical vulnerability patterns necessitate caution. The high number of unsanitized taint flows is a critical area of concern that could lead to severe exploits if not addressed comprehensively. Developers should prioritize thorough input validation and sanitization, particularly around `unserialize` calls, and continue to monitor for and address security vulnerabilities promptly.
Key Concerns
- Dangerous function: unserialize
- Taint flows with unsanitized paths (High severity)
- Vulnerability history: Deserialization of Untrusted Data
- Vulnerability history: Cross-site Scripting
- Recent high severity vulnerability patched
- Moderate output escaping (62% properly escaped)
- No nonce checks
Weaver Xtreme Theme Support Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Weaver Xtreme Theme Support <= 6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via div Shortcode
Weaver Xtreme Theme Support <= 6.3.0 - Authenticated (Administrator+) PHP Object Injection via Imported File
Weaver Xtreme Theme Support <= 6.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaver Xtreme Theme Support Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Weaver Xtreme Theme Support Attack Surface
WordPress Hooks 22
Maintenance & Trust
Weaver Xtreme Theme Support Maintenance & Trust
Maintenance Signals
Community Trust
Weaver Xtreme Theme Support Alternatives
Apollo13 Framework Extensions
apollo13-framework-extensions
Adds custom post types, shortcodes and some features that are used in themes built on Apollo13 Framework.
Popularis Extra
popularis-extra
Popularis Extra add extra features to Popularis theme like demo import, widgets, shortcodes or Elementor widgets.
Series
series
Plugin that allows you to collect posts in a series.
WordPress Widgets Shortcode
wp-widgets-shortcode
Embed any widget area/dynamic sidebar to your pages/posts using the shortcode [dynamic-sidebar id='Your Widget Area/Sidebar name']
Shortcodes in Sidebar
shortcodes-in-sidebar
Shortcodes in Sidebar allows shortcodes to execute in sidebars.
Weaver Xtreme Theme Support Developer Profile
6 plugins · 20K total installs
How We Detect Weaver Xtreme Theme Support
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.