web service all in one Security & Risk Analysis

wordpress.org/plugins/web-service-all-in-one

web service all in one

0 active installs v1.0.0 PHP 7.0+ WP 5.0.0+ Updated Jun 7, 2020
hostingpackageservicesliderteam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is web service all in one Safe to Use in 2026?

Generally Safe

Score 85/100

web service all in one has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "web-service-all-in-one" v1.0.0 plugin exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. Furthermore, the plugin has no recorded CVEs, suggesting a history of responsible development or a lack of prior security findings. This indicates a potentially strong focus on secure coding practices.

However, there are significant areas for concern. The plugin has a total of 7 entry points in the form of shortcodes, and the static analysis reports 0 capability checks and 0 nonce checks across all entry points. This means that any user, regardless of their logged-in status or role, could potentially trigger functionality within these shortcodes without any authentication or authorization validation. Additionally, a concerningly low 28% of output is properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is outputted without sufficient sanitization. The lack of taint analysis flows and the absence of any reported vulnerability history, while positive on the surface, could also mean that deeper vulnerabilities are simply not being detected by the current analysis methods or haven't been discovered yet.

In conclusion, while the plugin avoids common pitfalls like raw SQL and dangerous functions, the severe lack of authentication and authorization checks on its shortcode entry points, coupled with poor output escaping, presents a significant risk. The vulnerability history is positive but should not be solely relied upon given the other detected weaknesses. A thorough security audit focusing on these exposed entry points and output handling is highly recommended.

Key Concerns

  • Shortcodes lack capability checks
  • Shortcodes lack nonce checks
  • Low percentage of properly escaped output
Vulnerabilities
None known

web service all in one Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

web service all in one Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
23
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

28% escaped32 total outputs
Attack Surface

web service all in one Attack Surface

Entry Points7
Unprotected0

Shortcodes 7

[about] admin\about\mamurjorabout.php:70
[course] admin\course\mamurjorcourse.php:119
[feedback] admin\feedback\mamurjorfeedback.php:116
[slider] admin\home-slider\homeslider.php:65
[learn] admin\learn\mamurjorlearn.php:176
[package] admin\package\mamurjorpackage.php:65
[team] admin\team\mamurjorteam.php:206
WordPress Hooks 24
actioninitadmin\about\mamurjorabout.php:67
actioninitadmin\course\mamurjorcourse.php:64
actionadd_meta_boxesadmin\course\mamurjorcourse.php:86
actionsave_postadmin\course\mamurjorcourse.php:116
actioninitadmin\feedback\mamurjorfeedback.php:60
actionadd_meta_boxesadmin\feedback\mamurjorfeedback.php:82
actionsave_postadmin\feedback\mamurjorfeedback.php:112
actioninitadmin\home-slider\homeslider.php:62
actioninitadmin\learn\mamurjorlearn.php:64
actionadd_meta_boxesadmin\learn\mamurjorlearn.php:89
actionsave_postadmin\learn\mamurjorlearn.php:119
actionadd_meta_boxesadmin\learn\mamurjorlearn.php:142
actionsave_postadmin\learn\mamurjorlearn.php:173
actioninitadmin\package\mamurjorpackage.php:62
actioninitadmin\team\mamurjorteam.php:62
actionadd_meta_boxesadmin\team\mamurjorteam.php:83
actionsave_postadmin\team\mamurjorteam.php:168
actionsave_postadmin\team\mamurjorteam.php:185
actionsave_postadmin\team\mamurjorteam.php:203
actionplugins_loadedincludes\class-webserviceallinone.php:142
actionadmin_enqueue_scriptsincludes\class-webserviceallinone.php:157
actionadmin_enqueue_scriptsincludes\class-webserviceallinone.php:158
actionwp_enqueue_scriptsincludes\class-webserviceallinone.php:173
actionwp_enqueue_scriptsincludes\class-webserviceallinone.php:174
Maintenance & Trust

web service all in one Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJun 7, 2020
PHP min version7.0
Downloads850

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

web service all in one Developer Profile

Mamurjor IT

6 plugins · 20 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect web service all in one

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/web-service-all-in-one/admin/about/mamurjorabout.php/wp-content/plugins/web-service-all-in-one/admin/course/mamurjorcourse.php/wp-content/plugins/web-service-all-in-one/admin/feedback/mamurjorfeedback.php/wp-content/plugins/web-service-all-in-one/admin/home-slider/homeslider.php/wp-content/plugins/web-service-all-in-one/admin/learn/mamurjorlearn.php/wp-content/plugins/web-service-all-in-one/admin/package/mamurjorpackage.php/wp-content/plugins/web-service-all-in-one/admin/team/mamurjorteam.php

HTML / DOM Fingerprints

CSS Classes
about_single
REST Endpoints
/wp-json/wp/v2/mamurjorabout
Shortcode Output
<div class="row"><div class="col-md-6"><div class="about_single"><img alt="Bootstrap Image Preview"
FAQ

Frequently Asked Questions about web service all in one