
WebMan Amplifier Security & Risk Analysis
wordpress.org/plugins/webman-amplifierAmplifies functionality of WP themes. Provides custom post types, shortcodes, metaboxes, icons. Theme developer's best friend!
Is WebMan Amplifier Safe to Use in 2026?
Generally Safe
Score 99/100WebMan Amplifier has a strong security track record. Known vulnerabilities have been patched promptly.
The webman-amplifier plugin version 1.6.3 exhibits a generally strong security posture based on static analysis. The plugin demonstrates excellent adherence to secure coding practices, with no dangerous functions, no raw SQL queries, a very high percentage of properly escaped output, and no file operations or external HTTP requests. The presence of multiple nonce and capability checks, along with a contained attack surface of only one AJAX handler, suggests a thoughtful approach to securing its entry points. Taint analysis also reveals no concerning flows of unsanitized data, reinforcing the impression of a secure codebase.
However, the plugin's vulnerability history presents a significant concern. Despite the current version being unpatched, the historical presence of one medium-severity vulnerability, specifically Cross-site Scripting (XSS), indicates a past weakness. The 'last vulnerability' date of 2025-12-31 00:00:00 is highly unusual and likely a placeholder or erroneous data, but it still points to a history of past exploitable issues.
In conclusion, while the current code appears robust and well-secured against common attack vectors, the past XSS vulnerability is a red flag. This history suggests that while developers may have improved their practices, a latent risk could still exist if the underlying cause of the previous vulnerability was not fully addressed or if new, unforeseen vulnerabilities arise. The plugin's strengths lie in its careful handling of data and secure entry points, but the historical context necessitates vigilance.
Key Concerns
- Historical medium severity vulnerability
WebMan Amplifier Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
WebMan Amplifier <= 1.5.12 - Authenticated (Contributor+) Stored Cross-Site Scripting
WebMan Amplifier Code Analysis
Output Escaping
Data Flow Analysis
WebMan Amplifier Attack Surface
AJAX Handlers 1
WordPress Hooks 110
Maintenance & Trust
WebMan Amplifier Maintenance & Trust
Maintenance Signals
Community Trust
WebMan Amplifier Alternatives
Apollo13 Framework Extensions
apollo13-framework-extensions
Adds custom post types, shortcodes and some features that are used in themes built on Apollo13 Framework.
Material Design Icons for Page Builders
material-design-icons-for-elementor
Material Design Icons for Page Builders - adds Google Material Design Icons into Icons control of Page Builders
CubeWP Framework
cubewp-framework
CubeWP is an end-to-end dynamic content framework for WordPress to help you shrink time and cut cost of development up to 90%.
Popular Brand Icons – Simple Icons
simple-icons
An easy to use lightweight SVG icons plugin with over 1500+ brand icons. Use these icons in your menus, widgets, posts, or pages.
SFN Easy FAQ Manager
wordpress-faq-manager
Uses custom post types and taxonomies to manage an FAQ section for your site.
WebMan Amplifier Developer Profile
21 plugins · 14K total installs
How We Detect WebMan Amplifier
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/webman-amplifier/assets/css//wp-content/plugins/webman-amplifier/assets/js//wp-content/plugins/webman-amplifier/includes/compatibility/assets//wp-content/plugins/webman-amplifier/assets/js/wm-amplifier.jswebman-amplifier/assets/js/wm-amplifier.js?ver=webman-amplifier/assets/css/wm-amplifier.css?ver=HTML / DOM Fingerprints
wm-amplifier-fieldwm-metabox-wrapper<!-- WebMan Amplifier metabox -->data-wm-field-prefixdata-wm-serialized-namewindow.WM_Amplifier_Config[wm_amplifier]