Call to Action Security & Risk Analysis

wordpress.org/plugins/call-to-action

Displays the most relavent Call to Action in your sidebar based on the content of the page

30 active installs v1.3 PHP + WP 3.0+ Updated Apr 30, 2013
call-to-actioncontent-sidebarmarketingpromotewidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Call to Action Safe to Use in 2026?

Generally Safe

Score 85/100

Call to Action has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "call-to-action" plugin v1.3 exhibits a generally positive security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and a clean vulnerability history are significant strengths, suggesting the developers have a good track record of addressing security issues promptly. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and performing capability checks for its entry points. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, is also a positive indicator.

However, there are a few areas of concern that temper this otherwise good assessment. The presence of the `create_function` dangerous function is a significant red flag, as it can lead to arbitrary code execution if not handled with extreme care and sanitization. While the taint analysis shows no critical or high severity unsanitized paths, the fact that both analyzed flows had unsanitized paths, even if low severity, warrants attention. Additionally, a substantial portion of the plugin's output (62%) is not properly escaped, creating a risk of Cross-Site Scripting (XSS) vulnerabilities if user-provided data is displayed without sufficient sanitization. The plugin's overall lack of external HTTP requests and file operations are positive points, but the identified code signals and taint analysis results indicate potential for exploitation if not addressed.

In conclusion, while the plugin has a strong foundation with no historical vulnerabilities and good practices in SQL and authentication checks, the use of `create_function` and the significant amount of unescaped output represent notable weaknesses. The taint analysis, even with low severity issues, suggests that careful review of data handling is still necessary. Addressing these specific code signals and potential XSS vectors would significantly improve the plugin's security.

Key Concerns

  • Dangerous function create_function used
  • Significant amount of unescaped output
  • Flows with unsanitized paths (even if low severity)
Vulnerabilities
None known

Call to Action Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Call to Action Release Timeline

v1.3Current
v1.2
v1.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

Call to Action Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
8
5 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("CTAW_Widget");'));call-to-action.php:46

Output Escaping

38% escaped13 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ctaw_do_redirect (call-to-action-functions.php:3)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Call to Action Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ctaw] call-to-action.php:45
WordPress Hooks 11
actionwidgets_initcall-to-action.php:46
actioninitcall-to-action.php:47
filterpost_updated_messagescall-to-action.php:49
actioncontextual_helpcall-to-action.php:51
actioninitcall-to-action.php:53
filtermanage_edit-ctaw_sortable_columnscall-to-action.php:55
filterposts_orderbycall-to-action.php:56
actionmanage_posts_custom_columncall-to-action.php:57
filtermanage_edit-ctaw_columnscall-to-action.php:58
actionadmin_menucall-to-action.php:61
actionsave_postcall-to-action.php:62
Maintenance & Trust

Call to Action Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 30, 2013
PHP min version
Downloads9K

Community Trust

Rating60/100
Number of ratings2
Active installs30
Developer Profile

Call to Action Developer Profile

Jon Bishop

7 plugins · 4K total installs

83
trust score
Avg Security Score
93/100
Avg Patch Time
89 days
View full developer profile
Detection Fingerprints

How We Detect Call to Action

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/call-to-action/css/call-to-action.css/wp-content/plugins/call-to-action/js/call-to-action.js
Script Paths
/wp-content/plugins/call-to-action/js/call-to-action.js
Version Parameters
call-to-action/css/call-to-action.css?ver=call-to-action/js/call-to-action.js?ver=

HTML / DOM Fingerprints

Shortcode Output
[ctaw]
FAQ

Frequently Asked Questions about Call to Action