
Call to Action Security & Risk Analysis
wordpress.org/plugins/call-to-actionDisplays the most relavent Call to Action in your sidebar based on the content of the page
Is Call to Action Safe to Use in 2026?
Generally Safe
Score 85/100Call to Action has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "call-to-action" plugin v1.3 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and a clean vulnerability history are significant strengths, suggesting the developers have a good track record of addressing security issues promptly. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and performing capability checks for its entry points. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, is also a positive indicator.
However, there are a few areas of concern that temper this otherwise good assessment. The presence of the `create_function` dangerous function is a significant red flag, as it can lead to arbitrary code execution if not handled with extreme care and sanitization. While the taint analysis shows no critical or high severity unsanitized paths, the fact that both analyzed flows had unsanitized paths, even if low severity, warrants attention. Additionally, a substantial portion of the plugin's output (62%) is not properly escaped, creating a risk of Cross-Site Scripting (XSS) vulnerabilities if user-provided data is displayed without sufficient sanitization. The plugin's overall lack of external HTTP requests and file operations are positive points, but the identified code signals and taint analysis results indicate potential for exploitation if not addressed.
In conclusion, while the plugin has a strong foundation with no historical vulnerabilities and good practices in SQL and authentication checks, the use of `create_function` and the significant amount of unescaped output represent notable weaknesses. The taint analysis, even with low severity issues, suggests that careful review of data handling is still necessary. Addressing these specific code signals and potential XSS vectors would significantly improve the plugin's security.
Key Concerns
- Dangerous function create_function used
- Significant amount of unescaped output
- Flows with unsanitized paths (even if low severity)
Call to Action Security Vulnerabilities
Call to Action Release Timeline
Call to Action Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Call to Action Attack Surface
Shortcodes 1
WordPress Hooks 11
Maintenance & Trust
Call to Action Maintenance & Trust
Maintenance Signals
Community Trust
Call to Action Alternatives
Mailjet Email Marketing
mailjet-for-wordpress
Includes WooCommerce automated and order emails. Design, send and track engaging marketing and transactional emails from your WordPress admin.
Newsletter Subscription Form – User Subscriptions Form, Capture Email
newsletter-subscription-form
Newsletter Subscription Form for WordPress is the ultimate lead generation, customer acquisition and email marketing plugin to grow and engage your ma …
Email Marketing Plugin – WP Email Capture
wp-email-capture
Double opt-in form for building your email list. Define landing pages to distribute your ebooks & software.
Floating Awesome Button (Sticky Button, Popup, Toast) & 200+ Website Custom Interactive Element
floating-awesome-button
Floating Awesome Button (FAB) helps website owner, getting more conversion, by adding interactive element such as (Sticky Button, Popup, Toast, etc)
Smaily for WP
smaily-for-wp
Smaily newsletter subscription plugin for WordPress
Call to Action Developer Profile
7 plugins · 4K total installs
How We Detect Call to Action
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/call-to-action/css/call-to-action.css/wp-content/plugins/call-to-action/js/call-to-action.js/wp-content/plugins/call-to-action/js/call-to-action.jscall-to-action/css/call-to-action.css?ver=call-to-action/js/call-to-action.js?ver=HTML / DOM Fingerprints
[ctaw]