
Call to Action Widget Security & Risk Analysis
wordpress.org/plugins/call-to-action-widgetA simple text widget with Title, Image URL, A text/html area, Link Text and Link URL. This simple widget is often used for a call to action widget.
Is Call to Action Widget Safe to Use in 2026?
Generally Safe
Score 85/100Call to Action Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "call-to-action-widget" v1.1 plugin exhibits a generally positive security posture with no recorded vulnerabilities or critical taint flows. The absence of SQL injection vulnerabilities due to the exclusive use of prepared statements is a significant strength. Furthermore, the plugin has a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks. File operations and external HTTP requests are also absent, reducing potential attack vectors.
However, there are several areas of concern that warrant attention. The presence of the `create_function` dangerous function is a known security risk that can lead to code injection if used with unsanitized input, although no specific instances were found in the taint analysis. The low percentage of properly escaped output (33%) indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks on entry points, while the attack surface is currently zero, leaves it open to potential CSRF attacks should any entry points be introduced in the future without proper protection.
Given the plugin's clean vulnerability history, it suggests diligent maintenance or a lack of significant exploitation attempts. Nevertheless, the identified code quality issues, particularly concerning output escaping and the use of `create_function`, present inherent risks that could be exploited. The plugin's strengths lie in its limited attack surface and secure data handling for SQL queries, but these are somewhat overshadowed by potential XSS flaws and the use of a deprecated, insecure function.
Key Concerns
- Dangerous function detected (create_function)
- Low percentage of properly escaped output
- No nonce checks on entry points
Call to Action Widget Security Vulnerabilities
Call to Action Widget Code Analysis
Dangerous Functions Found
Output Escaping
Call to Action Widget Attack Surface
WordPress Hooks 1
Maintenance & Trust
Call to Action Widget Maintenance & Trust
Maintenance Signals
Community Trust
Call to Action Widget Alternatives
WP Shaper Image and Text
wp-shaper-image-and-text
WP Shaper Image and Text is a dynamic image & text widget plugin for display sidebar or any where in your site.
WP Master Widget
wp-master-widget
WP Master Widget is an advanced WordPress widget that allows easy styling and organization for text, fontawesome icon, image, and more types of elemen …
Simple Image Widget
simple-image-widget
A simple widget that makes it a breeze to add images to your sidebars.
Image Widget
image-widget-rb
Image Widget - most simple and fast way to create image widget to your sidebar
Classic Text Widget
classic-text-widget
The classic pre-WordPress version 4.8 text widget
Call to Action Widget Developer Profile
1 plugin · 200 total installs
How We Detect Call to Action Widget
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
widget_ctactabuttonfor="imgabove"name="imageplace"id="imgabove"value="above"checkedid="imgbelow"+13 more