Call to Action Widget Security & Risk Analysis

wordpress.org/plugins/call-to-action-widget

A simple text widget with Title, Image URL, A text/html area, Link Text and Link URL. This simple widget is often used for a call to action widget.

200 active installs v1.1 PHP + WP 3.0.2+ Updated Dec 10, 2013
call-to-action-widgetcta-widgetimage-widgettext-widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Call to Action Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Call to Action Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "call-to-action-widget" v1.1 plugin exhibits a generally positive security posture with no recorded vulnerabilities or critical taint flows. The absence of SQL injection vulnerabilities due to the exclusive use of prepared statements is a significant strength. Furthermore, the plugin has a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack proper authentication or permission checks. File operations and external HTTP requests are also absent, reducing potential attack vectors.

However, there are several areas of concern that warrant attention. The presence of the `create_function` dangerous function is a known security risk that can lead to code injection if used with unsanitized input, although no specific instances were found in the taint analysis. The low percentage of properly escaped output (33%) indicates a significant risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks on entry points, while the attack surface is currently zero, leaves it open to potential CSRF attacks should any entry points be introduced in the future without proper protection.

Given the plugin's clean vulnerability history, it suggests diligent maintenance or a lack of significant exploitation attempts. Nevertheless, the identified code quality issues, particularly concerning output escaping and the use of `create_function`, present inherent risks that could be exploited. The plugin's strengths lie in its limited attack surface and secure data handling for SQL queries, but these are somewhat overshadowed by potential XSS flaws and the use of a deprecated, insecure function.

Key Concerns

  • Dangerous function detected (create_function)
  • Low percentage of properly escaped output
  • No nonce checks on entry points
Vulnerabilities
None known

Call to Action Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Call to Action Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
30
15 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "RT_Widget_Text" );' ) );cta-widget.php:93

Output Escaping

33% escaped45 total outputs
Attack Surface

Call to Action Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initcta-widget.php:93
Maintenance & Trust

Call to Action Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 10, 2013
PHP min version
Downloads14K

Community Trust

Rating94/100
Number of ratings6
Active installs200
Developer Profile

Call to Action Widget Developer Profile

Charlie Strickler

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Call to Action Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_ctactabutton
Data Attributes
for="imgabove"name="imageplace"id="imgabove"value="above"checkedid="imgbelow"+13 more
FAQ

Frequently Asked Questions about Call to Action Widget