WP Open Hour Widget Security & Risk Analysis

wordpress.org/plugins/wp-open-hours

WP Open Hours give your customers definite answer when you will be open or closed!

30 active installs v1.0 PHP + WP 3.3+ Updated Nov 18, 2014
business-hoursbusiness-hours-widgetbusiness-pluginbusiness-widgetwp-open-hour
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Open Hour Widget Safe to Use in 2026?

Generally Safe

Score 85/100

WP Open Hour Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "wp-open-hours" v1.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no known dangerous functions, no file operations, and no external HTTP requests. Crucially, all identified SQL queries utilize prepared statements, and there are no recorded vulnerabilities (CVEs), which suggests a history of security awareness and attention. The absence of any recorded taint analysis findings also indicates that potential data flow issues might have been addressed or are not present.

However, significant concerns arise from the complete lack of output escaping. With 20 total outputs and 0% properly escaped, this presents a substantial risk for Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed by the plugin is susceptible to injection. Furthermore, the absence of nonce and capability checks on any potential entry points (though the attack surface appears minimal at 0, this could change with future updates or if features are added) is a worrying oversight. The inclusion of a very outdated jQuery v1.7.2 library is also a security risk, as older versions often contain known vulnerabilities.

In conclusion, while the plugin has a clean vulnerability history and good practices in database interaction, the severe lack of output escaping and the outdated bundled library create significant security weaknesses. These issues, if exploited, could lead to data compromise and unauthorized actions. Mitigation of XSS risks and updating the bundled library are paramount.

Key Concerns

  • 0% output escaping
  • Bundled outdated library (jQuery v1.7.2)
  • 0 Nonce checks on entry points
  • 0 Capability checks on entry points
Vulnerabilities
None known

WP Open Hour Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Open Hour Widget Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

WP Open Hour Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
20
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery1.7.2

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped20 total outputs
Attack Surface

WP Open Hour Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_headopenhour.php:22
actionadmin_menuopenhour.php:122
actionwidgets_initwp_openhour_widget.php:146
Maintenance & Trust

WP Open Hour Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 18, 2014
PHP min version
Downloads6K

Community Trust

Rating74/100
Number of ratings6
Active installs30
Developer Profile

WP Open Hour Widget Developer Profile

Prashant Raval

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Open Hour Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-open-hours/css/styles.css/wp-content/plugins/wp-open-hours/js/county.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Open Hour Widget