UseStrict's Calendly Embedder Security & Risk Analysis

wordpress.org/plugins/cal-embedder-lite

Simple but powerful embedding for Calendly.

2K active installs v1.2 PHP 7.4+ WP 4.5+ Updated Nov 29, 2025
calendarcalendlyembed
99
A · Safe
CVEs total1
Unpatched0
Last CVEDec 15, 2025
Safety Verdict

Is UseStrict's Calendly Embedder Safe to Use in 2026?

Generally Safe

Score 99/100

UseStrict's Calendly Embedder has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Dec 15, 2025Updated 5mo ago
Risk Assessment

The cal-embedder-lite plugin v1.2 demonstrates a generally good security posture, with 100% of SQL queries using prepared statements and all output being properly escaped. The static analysis reveals no dangerous functions, file operations, or untainted flows, which are positive indicators. The plugin also correctly implements a nonce check for its single AJAX handler, further hardening this entry point. However, the absence of capability checks on any entry points is a significant concern, leaving the AJAX handler potentially accessible to unauthenticated users if the nonce check were bypassed or if the AJAX handler itself doesn't enforce user permissions internally.

The vulnerability history shows a single medium-severity CVE related to Cross-site Scripting, which has been patched. While this is reassuring, the existence of past vulnerabilities, even if resolved, suggests potential for future issues if coding practices are not consistently maintained. The lack of observed taint flows in the current analysis is positive, but the past XSS vulnerability highlights the importance of ongoing vigilance in sanitizing user input, especially for features that might interact with external data or be rendered in the browser.

In conclusion, cal-embedder-lite v1.2 has implemented several key security best practices, particularly around data handling and output escaping. The primary weakness lies in the lack of explicit capability checks on its entry points, which could be a point of exploitation. The past XSS vulnerability, although patched, serves as a reminder that even well-intentioned code can harbor exploitable flaws.

Key Concerns

  • Missing capability checks on entry points
  • Past medium severity CVE (XSS)
Vulnerabilities
1 published

UseStrict's Calendly Embedder Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-67555medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

UseStrict's Calendly Embedder <= 1.1.7.2 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 15, 2025 Patched in 1.2 (5d)
Version History

UseStrict's Calendly Embedder Release Timeline

v1.2Current
v1.1.7.21 CVE
v1.1.7.11 CVE
v1.1.71 CVE
v1.1.6.21 CVE
v1.1.6.11 CVE
v1.1.61 CVE
v1.1.5.11 CVE
v1.1.51 CVE
v1.1.41 CVE
v1.1.31 CVE
v1.1.21 CVE
v1.1.11 CVE
v1.11 CVE
v1.0.21 CVE
v1.0.11 CVE
v1.01 CVE
Code Analysis
Analyzed Mar 16, 2026

UseStrict's Calendly Embedder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
82 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

100% escaped82 total outputs
Attack Surface

UseStrict's Calendly Embedder Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 1

authwp_ajax_wpcalel-userinfocal-embedder-lite.php:144

Shortcodes 1

[wpcalel] cal-embedder-lite.php:166
WordPress Hooks 5
actioninitcal-embedder-lite.php:142
actioninitcal-embedder-lite.php:143
actionadmin_menucal-embedder-lite.php:148
actionadmin_initcal-embedder-lite.php:149
filterplugin_action_linkscal-embedder-lite.php:608
Maintenance & Trust

UseStrict's Calendly Embedder Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 29, 2025
PHP min version7.4
Downloads25K

Community Trust

Rating100/100
Number of ratings3
Active installs2K
Developer Profile

UseStrict's Calendly Embedder Developer Profile

useStrict

2 plugins · 5K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
47 days
View full developer profile
Detection Fingerprints

How We Detect UseStrict's Calendly Embedder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cal-embedder-lite/assets/css/style.css/wp-content/plugins/cal-embedder-lite/assets/js/calendly.js
Script Paths
https://assets.calendly.com/assets/external/widget.js
Version Parameters
cal-embedder-lite/assets/css/style.css?ver=cal-embedder-lite/assets/js/calendly.js?ver=https://calendly.com/assets/external/widget.css?ver=https://assets.calendly.com/assets/external/widget.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpcalel-embed
Data Attributes
data-wpcalel-url
JS Globals
wpcalel
Shortcode Output
[wpcalel][wpcalel type="calendly" widget="inline" url="your-calendly-url"][wpcalel type="calendly" widget="popup" url="your-calendly-url"][wpcalel type="calendly" widget="link" url="your-calendly-url"]
FAQ

Frequently Asked Questions about UseStrict's Calendly Embedder