WP Enterprise Extension Security & Risk Analysis

wordpress.org/plugins/wp-enterprise-extension

The WP Enterprise Extension (WEX) is a multi-function plugin that adds a set of enhancements to tailor wordpress to an enterprise setting.

10 active installs v0.1.0 PHP + WP 3.1+ Updated Apr 18, 2014
acfenterprise
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Enterprise Extension Safe to Use in 2026?

Generally Safe

Score 85/100

WP Enterprise Extension has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-enterprise-extension plugin version 0.1.0 demonstrates a generally good security posture based on the provided static analysis. The absence of AJAX handlers and REST API routes, particularly those without authentication checks, significantly reduces the attack surface. The presence of nonce and capability checks further enhances security by implementing essential WordPress security practices. The plugin also avoids potentially risky operations like external HTTP requests and bundled libraries.

However, a notable concern arises from the handling of SQL queries. With three SQL queries present and 0% using prepared statements, there is a significant risk of SQL injection vulnerabilities. While no taint analysis findings or historical CVEs are reported, this lack of secure SQL query practices is a critical oversight that could be exploited. Furthermore, the relatively low percentage of properly escaped output (41%) suggests potential cross-site scripting (XSS) vulnerabilities, although the severity is not specified.

In conclusion, while the plugin benefits from a small attack surface and good use of WordPress security mechanisms like nonces and capabilities, the insecure handling of SQL queries and potentially insufficient output escaping present substantial security risks. The clean vulnerability history is positive but does not mitigate the inherent risks identified in the code analysis.

Key Concerns

  • Raw SQL queries without prepared statements
  • Low percentage of properly escaped output
Vulnerabilities
None known

WP Enterprise Extension Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Enterprise Extension Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
27
19 escaped
Nonce Checks
5
Capability Checks
8
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

41% escaped46 total outputs
Attack Surface

WP Enterprise Extension Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[theme_uri] wex-functions.php:100
[blog_uri] wex-functions.php:112
WordPress Hooks 35
actioninitcomponents\class-tgm-plugin-activation.php:177
actionadmin_menucomponents\class-tgm-plugin-activation.php:231
actionadmin_headcomponents\class-tgm-plugin-activation.php:232
filterinstall_plugin_complete_actionscomponents\class-tgm-plugin-activation.php:233
actionswitch_themecomponents\class-tgm-plugin-activation.php:234
actionwp_headcomponents\class-tgm-plugin-activation.php:240
actionadmin_headcomponents\class-tgm-plugin-activation.php:241
actionadmin_noticescomponents\class-tgm-plugin-activation.php:245
actionadmin_initcomponents\class-tgm-plugin-activation.php:246
actionadmin_enqueue_scriptscomponents\class-tgm-plugin-activation.php:247
actionswitch_themecomponents\class-tgm-plugin-activation.php:248
actionadmin_initcomponents\class-tgm-plugin-activation.php:254
actionswitch_themecomponents\class-tgm-plugin-activation.php:262
actionadmin_initcomponents\class-tgm-plugin-activation.php:1691
actionwp_headwex-fields.php:286
actionwp_footerwex-fields.php:311
actionadd_meta_boxeswex-fields.php:314
actionsave_postwex-fields.php:443
filterthe_contentwex-functions.php:19
filterwp_handle_uploadwex-functions.php:38
filterscript_loader_srcwex-functions.php:42
filterstyle_loader_srcwex-functions.php:43
actionacf/register_fieldswex-functions.php:66
actioncreated_categorywex-functions.php:130
actionedited_categorywex-functions.php:131
actiondelete_categorywex-functions.php:132
actionsave_postwex-functions.php:133
filtercategory_rewrite_ruleswex-functions.php:175
actiongenerate_rewrite_ruleswex-functions.php:177
actionwp_headwex-functions.php:201
actioninitwex-header-css-generator.php:11
actiontemplate_redirectwex-header-css-generator.php:45
filterrequestwex-header-css-generator.php:47
actiontgmpa_registerwex-initialize.php:6
filterupload_mimeswp-enterprise-extension.php:41
Maintenance & Trust

WP Enterprise Extension Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.0
Last updatedApr 18, 2014
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Enterprise Extension Developer Profile

Tor N. Johnson

5 plugins · 1K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Enterprise Extension

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-enterprise-extension/wex-functions.php/wp-content/plugins/wp-enterprise-extension/wex-fields.php/wp-content/plugins/wp-enterprise-extension/wex-header-css-generator.php/wp-content/plugins/wp-enterprise-extension/components/page-custom-blank.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Enterprise Extension