Call Leads WordPress Plugin Security & Risk Analysis

wordpress.org/plugins/call-leads

The easiest way to get more call leads, turn leads to customers.

20 active installs v1.0 PHP + WP 4.9+ Updated Sep 2, 2019
callcall-backcall-leadcall-leadscall-request
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Call Leads WordPress Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Call Leads WordPress Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "call-leads" plugin version 1.0 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, external HTTP requests, file operations, and raw SQL queries is a strong positive. The high percentage of properly escaped outputs and the use of prepared statements for SQL queries indicate developers are following secure coding practices in these areas. The plugin also demonstrates an awareness of security by implementing nonce checks on two entry points.

However, a significant concern arises from the complete lack of capability checks across all identified entry points, including the three AJAX handlers. This means that any user, regardless of their role or permissions within WordPress, could potentially trigger these AJAX actions. While there are no known vulnerabilities or taint flows reported, this lack of authorization on critical entry points presents a substantial risk of privilege escalation or unauthorized actions if a vulnerability were discovered or introduced in the future. The plugin's clean vulnerability history is a positive indicator, but it doesn't negate the inherent risk of exposed functionality.

In conclusion, "call-leads" v1.0 has some commendable security practices in place, particularly regarding data handling and escaping. Nevertheless, the complete omission of capability checks on its AJAX handlers creates a critical security weakness that significantly elevates its risk profile. Addressing this oversight should be a top priority to ensure the plugin's secure operation.

Key Concerns

  • No capability checks on AJAX handlers
Vulnerabilities
None known

Call Leads WordPress Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Call Leads WordPress Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
48 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped60 total outputs
Attack Surface

Call Leads WordPress Plugin Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_calds_save_wp_submissionsincludes\backend\CallLeads\CallLeads.php:21
noprivwp_ajax_calds_save_wp_submissionsincludes\backend\CallLeads\CallLeads.php:22
authwp_ajax_calds_save_admin_settingsincludes\backend\CallLeads\CallLeads.php:23
WordPress Hooks 10
actionadmin_menuincludes\backend\CallLeads\CallLeads.php:14
actioninitincludes\backend\CallLeads\CallLeads.php:15
actionadmin_enqueue_scriptsincludes\backend\CallLeads\CallLeads.php:18
actionwp_enqueue_scriptsincludes\backend\CallLeads\CallLeads.php:20
filtermanage_callleads_posts_columnsincludes\backend\CallLeads\CallLeads.php:24
actionmanage_callleads_posts_custom_columnincludes\backend\CallLeads\CallLeads.php:25
actionplugins_loadedincludes\backend\CallLeads\CallLeads.php:26
actionwp_footerincludes\backend\CallLeads\CallLeads.php:28
actionwp_footerincludes\backend\CallLeads\CallLeads.php:29
actionwp_footerincludes\backend\CallLeads\CallLeads.php:30
Maintenance & Trust

Call Leads WordPress Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedSep 2, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Call Leads WordPress Plugin Developer Profile

avadec

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Call Leads WordPress Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/call-leads/assets/css/jquery-ui.css/wp-content/plugins/call-leads/assets/css/admin_style.css/wp-content/plugins/call-leads/assets/css/admin_style_rtl.css/wp-content/plugins/call-leads/assets/js/wp-color-picker-alpha.min.js/wp-content/plugins/call-leads/assets/js/admin_script.js
Script Paths
/wp-content/plugins/call-leads/assets/js/wp-color-picker-alpha.min.js/wp-content/plugins/call-leads/assets/js/admin_script.js
Version Parameters
call-leads/assets/css/jquery-ui.css?ver=call-leads/assets/css/admin_style.css?ver=call-leads/assets/css/admin_style_rtl.css?ver=call-leads/assets/js/wp-color-picker-alpha.min.js?ver=call-leads/assets/js/admin_script.js?ver=

HTML / DOM Fingerprints

CSS Classes
calds_admin_csscalds_admin_rtl_css
JS Globals
CALDS_PLUGIN_URLCALDS_VERSION
REST Endpoints
/wp-json/callleads/
FAQ

Frequently Asked Questions about Call Leads WordPress Plugin