Callback widget Pozvonim Security & Risk Analysis

wordpress.org/plugins/callback-widget-pozvonim

Виджет обратного звонка Pozvonim - позволяет повысить конверсию сайта

30 active installs v20151220 PHP + WP 3.8+ Updated Dec 21, 2015
callbackchatlivechatpozvonimwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Callback widget Pozvonim Safe to Use in 2026?

Generally Safe

Score 85/100

Callback widget Pozvonim has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "callback-widget-pozvonim" plugin version v20151220 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points indicates a minimal attack surface. Furthermore, the code signals reveal no dangerous functions, no unescaped SQL queries (all using prepared statements), and no file operations or external HTTP requests. The lack of vulnerability history suggests a history of secure development or effective patching, which is a positive indicator.

However, there are notable areas for improvement. The total output escaping is low, with only one-third of outputs being properly escaped. This means there's a significant risk of Cross-Site Scripting (XSS) vulnerabilities if any user-supplied data finds its way into the unescaped outputs. Additionally, the complete absence of nonce checks and capability checks across all potential entry points (even though the attack surface is currently zero) is a concern. If any new entry points are added in future updates without these fundamental security mechanisms, the plugin could become vulnerable. The taint analysis showing zero flows with unsanitized paths is reassuring, but this is dependent on the completeness of the analysis and the absence of complex or obscure data flows.

In conclusion, while the plugin currently has a clean slate and minimal attack surface, the unescaped output and lack of fundamental security checks like nonces and capability checks present potential weaknesses. The absence of past vulnerabilities is a strength, but it doesn't negate the need for robust security practices in the existing codebase and future development.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Callback widget Pozvonim Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Callback widget Pozvonim Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Callback widget Pozvonim Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initindex.php:18
actionwp_footerindex.php:38
Maintenance & Trust

Callback widget Pozvonim Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 21, 2015
PHP min version
Downloads6K

Community Trust

Rating80/100
Number of ratings2
Active installs30
Developer Profile

Callback widget Pozvonim Developer Profile

wpcraft

7 plugins · 700 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Callback widget Pozvonim

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Callback widget Pozvonim