WHMCS Bridge Security & Risk Analysis

wordpress.org/plugins/whmcs-bridge

WHMCS Bridge is a plugin that integrates the powerful WHMCS support and billing software with WordPress.

4K active installs v6.9 PHP + WP 5.0+ Updated Oct 17, 2022
billinghostingintegrationsupportwhmcs
84
B · Generally Safe
CVEs total2
Unpatched0
Last CVEJan 27, 2022
Safety Verdict

Is WHMCS Bridge Safe to Use in 2026?

Mostly Safe

Score 84/100

WHMCS Bridge is generally safe to use though it hasn't been updated recently. 2 past CVEs were resolved. Keep it updated.

2 known CVEsLast CVE: Jan 27, 2022Updated 3yr ago
Risk Assessment

The WHMCS Bridge plugin version 6.9 presents a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and implementing nonce checks on its entry points. The absence of any currently unpatched CVEs is also a strength, indicating that previously discovered vulnerabilities have been addressed. However, several concerns warrant attention. The presence of two dangerous `unserialize` functions is a significant risk, as improper handling of serialized data can lead to remote code execution vulnerabilities. While taint analysis did not reveal critical or high severity unsanitized paths, the fact that 6 out of 8 analyzed flows had unsanitized paths suggests a potential for subtle vulnerabilities if the `unserialize` functions are misused or if other input handling mechanisms are not robust. Furthermore, a substantial 57% of output escaping indicates a potential for Cross-Site Scripting (XSS) vulnerabilities, especially considering past CVEs have been related to this type of attack. The plugin's history of medium severity XSS vulnerabilities, with the last one in early 2022, suggests a recurring issue that needs continuous vigilance.

In conclusion, while the plugin benefits from secure database interactions and basic input validation (nonces), the reliance on `unserialize` and the moderate level of output escaping are areas of concern that elevate its risk profile. The historical pattern of XSS vulnerabilities further emphasizes the need for careful review of how user-supplied data is handled and displayed. Developers should prioritize sanitizing and properly escaping all data, especially when dealing with potentially dangerous functions like `unserialize`.

Key Concerns

  • Dangerous function 'unserialize' used
  • Moderate output escaping (57% proper)
  • Unsanitized paths in taint analysis flows
  • 2 known medium severity CVEs historically
Vulnerabilities
2

WHMCS Bridge Security Vulnerabilities

CVEs by Year

2 CVEs in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2021-25112medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WHMCS Bridge <= 6.3 - Reflected Cross-Site Scripting

Jan 27, 2022 Patched in 6.4b (726d)
CVE-2021-4074medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WHMCS Bridge <= 6.1 Subscriber+ Stored Cross-Site Scripting

Jan 14, 2022 Patched in 6.3 (739d)
Code Analysis
Analyzed Mar 16, 2026

WHMCS Bridge Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
1 prepared
Unescaped Output
76
99 escaped
Nonce Checks
2
Capability Checks
0
File Operations
12
External Requests
6
Bundled Libraries
0

Dangerous Functions Found

unserialize$current = unserialize(get_option('cc_whmcs_bridge_cache' . $cache_flag));bridge.init.php:1045
unserialize$titles = unserialize($titles);includes\parser.inc.php:567

SQL Query Safety

100% prepared1 total queries

Output Escaping

57% escaped175 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

8 flows6 with unsanitized paths
cc_whmcs_bridge_output (bridge.init.php:458)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WHMCS Bridge Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_check_bridgebridge.init.php:51
WordPress Hooks 16
actioninitbridge.init.php:42
filterwp_footerbridge.init.php:45
filterthe_contentbridge.init.php:47
actionwp_headbridge.init.php:49
actionplugins_loadedbridge.init.php:50
actionadmin_headbridge.init.php:54
actionadmin_noticesbridge.init.php:55
actionwp_loadedbridge.init.php:57
actionadmin_menubridge_cp.php:212
actionwidgets_initincludes\sidebars.php:3
actionwidgets_initincludes\sidebars.php:4
actionwidgets_initincludes\sidebars.php:5
actionwidgets_initincludes\sidebars.php:6
actionwidgets_initincludes\sidebars.php:7
actionwidgets_initincludes\sidebars.php:8
actionwidgets_initincludes\sidebars.php:9
Maintenance & Trust

WHMCS Bridge Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedOct 17, 2022
PHP min version
Downloads533K

Community Trust

Rating62/100
Number of ratings73
Active installs4K
Developer Profile

WHMCS Bridge Developer Profile

Global Programming

2 plugins · 4K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
733 days
View full developer profile
Detection Fingerprints

How We Detect WHMCS Bridge

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/whmcs-bridge/css/whmcs-bridge.css/wp-content/plugins/whmcs-bridge/js/whmcs-bridge.js/wp-content/plugins/whmcs-bridge/includes/css/whmcs-bridge.css/wp-content/plugins/whmcs-bridge/includes/js/whmcs-bridge.js
Script Paths
/wp-content/plugins/whmcs-bridge/js/whmcs-bridge.js
Version Parameters
whmcs-bridge/css/whmcs-bridge.css?ver=whmcs-bridge/js/whmcs-bridge.js?ver=

HTML / DOM Fingerprints

CSS Classes
whmcs_bridge_mainpagewhmcs_bridge_content
HTML Comments
<!-- WHMCS Bridge --><!-- WHMCS Bridge End --><!-- WHMCS Bridge CSS --><!-- WHMCS Bridge JS -->+1 more
Data Attributes
data-whmcs-bridge-urldata-whmcs-bridge-login-urldata-whmcs-bridge-register-urldata-whmcs-bridge-page-id
JS Globals
whmcs_bridge_varswhmcs_bridge_ajaxurl
Shortcode Output
[whmcs_bridge][/whmcs_bridge][whmcs_ticket][/whmcs_ticket]
FAQ

Frequently Asked Questions about WHMCS Bridge