
Breeze Display Security & Risk Analysis
wordpress.org/plugins/wt-display-breezeA plugin that brings in your Breeze church management software data (events, full calendar, pledges, donations and contributions) for display on your …
Is Breeze Display Safe to Use in 2026?
Generally Safe
Score 99/100Breeze Display has a strong security track record. Known vulnerabilities have been patched promptly.
The "wt-display-breeze" plugin v1.2.4 presents a mixed security profile. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and has no known unpatched vulnerabilities, indicating a generally well-maintained codebase regarding past issues. The static analysis also shows no direct dangerous functions, file operations, or external HTTP requests, which are common attack vectors.
However, several concerning areas were identified in the static analysis. The plugin exhibits a concerningly low percentage (25%) of properly escaped output, suggesting a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis revealed "flows with unsanitized paths," indicating potential for sensitive data to be exposed or manipulated without proper sanitization, although no critical or high severity issues were flagged in this specific analysis. The absence of nonce checks and capability checks across its entry points (shortcodes) is a significant weakness, allowing unauthenticated or low-privileged users to potentially trigger unintended actions or access restricted data through these shortcodes.
The vulnerability history shows a past medium severity vulnerability related to XSS, reinforcing the concern raised by the low output escaping. While there are no currently unpatched vulnerabilities, the pattern of past XSS issues coupled with the current lack of output escaping and authorization checks on shortcodes suggests an ongoing risk of similar vulnerabilities if not addressed. The plugin's strengths lie in its SQL handling and lack of unpatched CVEs, but its weaknesses in output sanitization and authorization for shortcodes pose a tangible risk to WordPress installations.
Key Concerns
- Low output escaping percentage (25%)
- Unsanitized paths in taint analysis
- No nonce checks on entry points (shortcodes)
- No capability checks on entry points (shortcodes)
- Past medium XSS vulnerability
Breeze Display Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Breeze Display <= 1.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via cal_size Parameter
Breeze Display Code Analysis
Output Escaping
Data Flow Analysis
Breeze Display Attack Surface
Shortcodes 4
WordPress Hooks 20
Maintenance & Trust
Breeze Display Maintenance & Trust
Maintenance Signals
Community Trust
Breeze Display Alternatives
No alternatives data available yet.
Breeze Display Developer Profile
4 plugins · 280 total installs
How We Detect Breeze Display
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wt-display-breeze/includes/js/wt-breeze-admin.js/wp-content/plugins/wt-display-breeze/includes/js/wt-breeze-frontend.js/wp-content/plugins/wt-display-breeze/includes/css/wt-breeze-admin.css/wp-content/plugins/wt-display-breeze/includes/css/wt-breeze-frontend.css/wp-content/plugins/wt-display-breeze/includes/css/wt-breeze-widget.csshttps://livebar.church/livebar.jswt-breeze-admin.js?ver=wt-breeze-frontend.js?ver=wt-breeze-admin.css?ver=wt-breeze-frontend.css?ver=wt-breeze-widget.css?ver=HTML / DOM Fingerprints
wt-breeze-calendarwt-breeze-event-listwt-breeze-pledge-formwt-breeze-donation-formwt-breeze-contribution-formlivebar-headerdata-layoutdata-background-colordata-button-colordata-text-colordata-button-text-colordata-button-text+8 morewt_breeze_admin_varswt_breeze_frontend_vars[wt_breeze_calendar][wt_breeze_event_list][wt_breeze_pledge_form][wt_breeze_donation_form]