WP Opensearch Advance Security & Risk Analysis

wordpress.org/plugins/wp-opensearch-advance

Add Open Search to your website has never been so easy.

10 active installs v1.0.0 PHP + WP 3.0.1+ Updated Sep 17, 2014
opensearchseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Opensearch Advance Safe to Use in 2026?

Generally Safe

Score 85/100

WP Opensearch Advance has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "wp-opensearch-advance" v1.0.0 plugin presents a significant security risk due to its lack of proper authentication and input sanitization on its AJAX endpoints. The static analysis reveals that all 4 AJAX handlers are exposed without any authentication checks. Furthermore, all 4 analyzed taint flows originate from unsanitized paths, indicating a high likelihood of vulnerabilities like Cross-Site Scripting (XSS) or SQL Injection if these flows are exploited. While the plugin has no known historical vulnerabilities, this absence can be misleading; the current code analysis points to critical weaknesses that could lead to severe security incidents. The plugin's strengths lie in the absence of dangerous functions, file operations, and external HTTP requests, as well as its minimal use of bundled libraries. However, the lack of capability checks and the significant number of unescaped outputs (77%) further compound the risks, making it vulnerable to unauthorized actions and potential information leakage. The reliance on raw SQL queries without prepared statements is also a serious concern, increasing the potential for SQL injection attacks.

Key Concerns

  • AJAX handlers without auth checks
  • Taint flows with unsanitized paths (high severity)
  • SQL queries without prepared statements
  • Lack of capability checks
  • Low output escaping percentage
  • Nonce checks on only 2 of 4 entry points
Vulnerabilities
None known

WP Opensearch Advance Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Opensearch Advance Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
20
6 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

23% escaped26 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
form_handler (scb\AdminPage.php:196)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

WP Opensearch Advance Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 4

authwp_ajax_opensearch_descriptioncore.php:22
authwp_ajax_opensearch_suggestcore.php:23
noprivwp_ajax_opensearch_descriptioncore.php:25
noprivwp_ajax_opensearch_suggestcore.php:26
WordPress Hooks 16
actionwp_headcore.php:20
action_admin_menuscb\AdminPage.php:58
actionadmin_initscb\AdminPage.php:116
actionadmin_noticesscb\AdminPage.php:117
actionadmin_menuscb\AdminPage.php:120
filtercontextual_helpscb\AdminPage.php:121
actionadmin_noticesscb\AdminPage.php:215
filtercron_schedulesscb\Cron.php:57
actionactivate_pluginscb\load.php:32
actionplugins_loadedscb\load.php:38
actionload-post.phpscb\PostMetabox.php:30
actionload-post-new.phpscb\PostMetabox.php:31
actionadd_meta_boxesscb\PostMetabox.php:44
actionsave_postscb\PostMetabox.php:45
actionwidgets_initscb\Widget.php:13
actionadmin_noticeswpos_AdminPage.php:102
Maintenance & Trust

WP Opensearch Advance Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 17, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Opensearch Advance Developer Profile

Duoc Nguyen

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Opensearch Advance

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-opensearch-advance/style.css/wp-content/plugins/wp-opensearch-advance/js/admin.js
Script Paths
/wp-content/plugins/wp-opensearch-advance/scb/load.php/wp-content/plugins/wp-opensearch-advance/core.php
Version Parameters
wp-opensearch-advance/style.css?ver=wp-opensearch-advance/js/admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
wp-opensearch-advance-search-form
Data Attributes
data-opensearch-description-url
JS Globals
wp_opensearch_advanced_config
REST Endpoints
/wp-json/wp-opensearch-advance/v1/search
Shortcode Output
[wp_opensearch_advance_search]
FAQ

Frequently Asked Questions about WP Opensearch Advance