WP Events Hooks Listeners Security & Risk Analysis

wordpress.org/plugins/wp-events-hooks-listeners

Listen various events from Wordpress Core actions and perform actions. You can setup various workflow based on specific actions happening in Wordpress …

0 active installs v1.0 PHP 5.5+ WP 4.0+ Updated Oct 26, 2019
actioneventsexternalhooksremote
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Events Hooks Listeners Safe to Use in 2026?

Generally Safe

Score 85/100

WP Events Hooks Listeners has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The wp-events-hooks-listeners plugin v1.0 exhibits a concerning security posture despite a clean vulnerability history. The static analysis reveals a significant attack surface with two AJAX handlers, both lacking authentication checks. This directly exposes the plugin to potential unauthorized access and malicious actions. Furthermore, the presence of the `unserialize` function, a known dangerous function, without any apparent input sanitization or context for its use, presents a high risk of arbitrary code execution if attacker-controlled data can reach it. While the plugin demonstrates good practice in using prepared statements for SQL queries and a majority of its outputs are properly escaped, these strengths are overshadowed by the critical lack of security controls on its entry points and the potential for deserialization vulnerabilities.

The vulnerability history of zero CVEs is positive but does not negate the risks identified in the static analysis. It may indicate that the plugin is relatively new, has not been extensively targeted, or that past vulnerabilities (if any) were promptly addressed. However, relying solely on the absence of past vulnerabilities is a weak security strategy, especially when inherent weaknesses are present in the code. The plugin's total entry points are low, which is a positive, but the fact that all of them are unprotected is a significant red flag. In conclusion, while the plugin has some good coding practices, the critical lack of authentication on AJAX handlers and the potential for deserialization vulnerabilities make it a high-risk plugin that requires immediate attention and remediation.

Key Concerns

  • AJAX handlers without auth checks
  • Dangerous function 'unserialize' present
  • No nonce checks on AJAX handlers
  • No capability checks
  • Some outputs not properly escaped
Vulnerabilities
None known

WP Events Hooks Listeners Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Events Hooks Listeners Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$data = unserialize($options);src\Functions.php:168
unserializereturn unserialize($options);src\Functions.php:178

Output Escaping

67% escaped3 total outputs
Attack Surface
2 unprotected

WP Events Hooks Listeners Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_waoe_save_actions_webhookssrc\Bootstrap.php:43
authwp_ajax_waoe_get_actions_webhookssrc\Bootstrap.php:44
WordPress Hooks 6
actionadmin_initsrc\Bootstrap.php:15
filterplugin_row_metasrc\Bootstrap.php:17
actionadmin_menusrc\Bootstrap.php:36
actionadmin_enqueue_scriptssrc\Bootstrap.php:40
actionpublish_postsrc\Bootstrap.php:55
actionadmin_headsrc\Functions.php:38
Maintenance & Trust

WP Events Hooks Listeners Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedOct 26, 2019
PHP min version5.5
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WP Events Hooks Listeners Developer Profile

Shaharia Azam

5 plugins · 470 total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Events Hooks Listeners

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-events-hooks-listeners/assets/css/bootstrap.css/wp-content/plugins/wp-events-hooks-listeners/assets/css/sweetalert2.min.css/wp-content/plugins/wp-events-hooks-listeners/assets/css/main.css/wp-content/plugins/wp-events-hooks-listeners/assets/js/popper.min.js/wp-content/plugins/wp-events-hooks-listeners/assets/js/bootstrap.min.js/wp-content/plugins/wp-events-hooks-listeners/assets/js/sweetalert2.min.js/wp-content/plugins/wp-events-hooks-listeners/assets/js/main.js
Script Paths
popper.min.jsbootstrap.min.jssweetalert2.min.jsmain.js
Version Parameters
wp-events-hooks-listeners/assets/css/bootstrap.css?ver=wp-events-hooks-listeners/assets/css/sweetalert2.min.css?ver=wp-events-hooks-listeners/assets/css/main.css?ver=wp-events-hooks-listeners/assets/js/popper.min.js?ver=wp-events-hooks-listeners/assets/js/bootstrap.min.js?ver=wp-events-hooks-listeners/assets/js/sweetalert2.min.js?ver=wp-events-hooks-listeners/assets/js/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-mail-gateway-plugin-adminpage
Shortcode Output
<div class='wrap'><div class='container-fluid'><div class='wp-mail-gateway-plugin-adminpage' id='wpMailGatewayPluginAdminPage'>
FAQ

Frequently Asked Questions about WP Events Hooks Listeners