
Callcap Webmatch Security & Risk Analysis
wordpress.org/plugins/callcap-webmatchWorks with Webmatch by Callcap to associate pageviews with phone calls and dynamically change phone numbers on your Wordpress page using your Webmatch …
Is Callcap Webmatch Safe to Use in 2026?
Generally Safe
Score 85/100Callcap Webmatch has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The security posture of the callcap-webmatch plugin v1.6.5 shows a mixed bag of good practices and significant concerns. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and appears to have a small attack surface with no direct AJAX handlers, REST API routes, shortcodes, or cron events exposed without authorization checks. It also avoids file operations and external HTTP requests, which are common vectors for compromise.
However, the static analysis reveals critical weaknesses. The complete absence of capability checks and nonce checks, combined with 100% of output not being properly escaped, creates substantial risks. The taint analysis indicates one flow with an unsanitized path, and while it's not classified as critical or high, it's still a concerning sign. The lack of output escaping is particularly worrying, as it opens the door to cross-site scripting (XSS) vulnerabilities if any user-supplied data is ever displayed on the frontend. The plugin also utilizes a single SQL query that is properly prepared, which is a positive, but the overall lack of security controls in other areas outweighs this single strength.
Given the lack of historical vulnerabilities, it might suggest that the plugin has not been a target or that its limited functionality has not exposed exploitable weaknesses to date. However, relying on this lack of history is a dangerous assumption. The current code analysis points to significant potential for immediate exploitation due to unescaped output and missing authorization checks, which are foundational security practices. A balanced conclusion is that while the plugin appears to have a small attack surface and no historical issues, its current implementation contains fundamental security flaws that require immediate attention.
Key Concerns
- Missing capability checks
- Missing nonce checks
- Unescaped output detected
- Flows with unsanitized paths
Callcap Webmatch Security Vulnerabilities
Callcap Webmatch Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Callcap Webmatch Attack Surface
WordPress Hooks 4
Maintenance & Trust
Callcap Webmatch Maintenance & Trust
Maintenance Signals
Community Trust
Callcap Webmatch Alternatives
800.com Call Tracking
800-com-call-tracking
Seamlessly add 800.com dynamic number insertion to your WordPress site for enhanced call tracking and marketing attribution.
Dynamic Number Insertion
dynamic-number-insertion
Dynamically replace phone numbers on specific pages for location-based businesses, landing pages, and call tracking campaigns.
WP Call Button – Easy Click to Call Button for WordPress
wp-call-button
The best WordPress call now button plugin. We help you add a clickable phone link (quick call button), so people can easily call your business phone.
CallRail Phone Call Tracking
callrail-phone-call-tracking
Dynamically swap CallRail tracking phone numbers based on the visitor's referring source.
WhatConverts
whatconverts
Enables WhatConverts on all pages.
Callcap Webmatch Developer Profile
1 plugin · 10 total installs
How We Detect Callcap Webmatch
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/callcap-webmatch/style.css//webmatch.callcap.com/track/webmatch.jsHTML / DOM Fingerprints
<!-- Callcap Webmatch for Wordpress--><!-- No Webmatch campaigns are currently set up. -->var webmatch_