ATP Call Now Security & Risk Analysis

wordpress.org/plugins/atp-call-now

Show button Call Now on your website (support desktop and mobile).

800 active installs v1.0.3 PHP + WP 4.6+ Updated Mar 11, 2020
callcontactcustomershotlinesell
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJun 19, 2025
Safety Verdict

Is ATP Call Now Safe to Use in 2026?

Use With Caution

Score 63/100

ATP Call Now has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jun 19, 2025Updated 6yr ago
Risk Assessment

The 'atp-call-now' plugin, version 1.0.3, presents a mixed security posture. On the positive side, the static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed. Furthermore, the plugin demonstrates good practice by using prepared statements for all its SQL queries and not performing file operations or external HTTP requests. However, a significant concern arises from the extremely low percentage of properly escaped output (3%), indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks and capability checks on any entry points, coupled with zero taint analysis flows, is concerning. While the static analysis reports no immediate critical or high-severity issues in the current code, the historical vulnerability data, including one unpatched medium-severity CVE related to XSS, strongly suggests a pattern of insecurity and a need for diligent patching. The plugin's past issues and current output escaping deficiencies create a risk of XSS attacks, despite the lack of a large, immediately exploitable attack surface in this version.

Key Concerns

  • Unpatched CVE found
  • Very low output escaping percentage
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
1

ATP Call Now Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-50024medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

ATP Call Now <= 1.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting

Jun 19, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

ATP Call Now Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
36
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

3% escaped37 total outputs
Attack Surface

ATP Call Now Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_enqueue_scriptsATP-Call-Now.php:18
actionadmin_menuATP-Call-Now.php:20
filterplugin_row_metaATP-Call-Now.php:21
actionadmin_initATP-Call-Now.php:22
actionwp_enqueue_scriptsATP-Call-Now.php:25
actionwp_footerATP-Call-Now.php:26
Maintenance & Trust

ATP Call Now Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 11, 2020
PHP min version
Downloads5K

Community Trust

Rating20/100
Number of ratings1
Active installs800
Developer Profile

ATP Call Now Developer Profile

Truong Thanh

2 plugins · 830 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ATP Call Now

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/atp-call-now/css/style.css/wp-content/plugins/atp-call-now/js/script.js
Script Paths
/wp-content/plugins/atp-call-now/js/script.js
Version Parameters
atp-call-now/style.css?ver=atp-call-now/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
atp-call-now
Data Attributes
id="atpcn_upload_button"
JS Globals
atpcn_page_idatpcn_linkatpcn_textatpcn_left_rightatpcn_bottom_topatpcn_hide_pc+7 more
FAQ

Frequently Asked Questions about ATP Call Now