All-in-One Messenger Security & Risk Analysis

wordpress.org/plugins/all-in-one-messenger

Complete free solution to better manage customer service. Social messages, contact forms, live chat, and many other channels.

10 active installs v1.3 PHP 5.6+ WP 4.0+ Updated Jan 13, 2020
conversationscustomer-serviceemailformmessenger
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is All-in-One Messenger Safe to Use in 2026?

Generally Safe

Score 85/100

All-in-One Messenger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'all-in-one-messenger' plugin version 1.3 exhibits a mixed security posture. While it demonstrates good practices by using prepared statements for all SQL queries and having no recorded past vulnerabilities, significant concerns arise from its attack surface and code signals. The plugin has one AJAX handler that lacks authentication checks, representing a direct entry point for potential attackers. Furthermore, a concerning taint analysis result indicates one flow with an unsanitized path, though the severity is reported as critical or high, this still warrants investigation as it could be an avenue for attacks like cross-site scripting (XSS) or arbitrary file access depending on the nature of the unsanitized path.

The absence of any recorded CVEs and a clean vulnerability history suggest the plugin has been relatively stable and secure in the past. However, the static analysis reveals specific weaknesses that could be exploited if not addressed. The 45% proper output escaping is also a concern, implying that a substantial portion of output is not being sanitized, increasing the risk of XSS vulnerabilities. The presence of file operations and external HTTP requests, while not inherently insecure, can become vulnerabilities if not handled with proper sanitization and validation, especially in conjunction with unsanitized paths.

In conclusion, the plugin has a solid foundation with its SQL handling and vulnerability history. However, the unprotected AJAX endpoint and the detected unsanitized path in the taint analysis are critical weaknesses that significantly elevate its risk profile. The low percentage of properly escaped output is another area that requires immediate attention to prevent potential XSS attacks. Addressing these specific issues would greatly improve the plugin's overall security.

Key Concerns

  • Unprotected AJAX handler
  • Flow with unsanitized path
  • Low percentage of properly escaped output
  • No capability checks on entry points
Vulnerabilities
None known

All-in-One Messenger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

All-in-One Messenger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
35
29 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
4
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

45% escaped64 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<callback_facebook> (part\callback_facebook.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

All-in-One Messenger Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_init_ajax_messengerall-in-one-messenger.php:75
WordPress Hooks 17
actioninitall-in-one-messenger.php:66
actioninitall-in-one-messenger.php:68
actioninitall-in-one-messenger.php:71
actionadmin_menuall-in-one-messenger.php:72
actionadd_meta_boxesall-in-one-messenger.php:74
actioninitall-in-one-messenger.php:76
actionadmin_enqueue_scriptsall-in-one-messenger.php:77
actionadmin_noticesall-in-one-messenger.php:78
actionwp_dashboard_setupall-in-one-messenger.php:79
actionpre_get_postsall-in-one-messenger.php:81
actioninitall-in-one-messenger.php:82
filterbulk_actions-edit-conversationall-in-one-messenger.php:83
filterhandle_bulk_actions-edit-conversationall-in-one-messenger.php:84
actionmanage_conversation_posts_custom_columnall-in-one-messenger.php:86
filtermanage_conversation_posts_columnsall-in-one-messenger.php:87
actionadmin_initall-in-one-messenger.php:386
actionwpcf7_submitpart\callback_cf7.php:4
Maintenance & Trust

All-in-One Messenger Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedJan 13, 2020
PHP min version5.6
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

All-in-One Messenger Developer Profile

Andrea De Giovine

4 plugins · 150 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect All-in-One Messenger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/all-in-one-messenger/assets/css/admin/chat.css/wp-content/plugins/all-in-one-messenger/assets/css/admin/conversations.css/wp-content/plugins/all-in-one-messenger/assets/css/admin/dashboard.css/wp-content/plugins/all-in-one-messenger/assets/css/admin/style.css/wp-content/plugins/all-in-one-messenger/assets/js/admin/chat.js/wp-content/plugins/all-in-one-messenger/assets/js/admin/conversations.js/wp-content/plugins/all-in-one-messenger/assets/js/admin/dashboard.js/wp-content/plugins/all-in-one-messenger/assets/js/admin/script.js

HTML / DOM Fingerprints

CSS Classes
alternativebu-me-chat-wrapbu-me-chat-listbu-me-chat-itembu-me-chat-avatarbu-me-chat-bubblebu-me-chat-metabu-me-chat-form-wrap+5 more
HTML Comments
<!-- Conversations -->
Data Attributes
data-chat-iddata-chat-typedata-chat-userdata-chat-date
JS Globals
AIO_ME_SETTINGSaiom_varsaiom_chat
Shortcode Output
[aiom_chat]
FAQ

Frequently Asked Questions about All-in-One Messenger