Calliope Security & Risk Analysis

wordpress.org/plugins/calliope

AI-powered content generator that creates professional articles automatically 24/7 using ChatGPT. 36x faster generation, save $75,000/month.

0 active installs v3.2.0 PHP 7.4+ WP 5.0+ Updated Feb 23, 2026
aiautomationcontent-generationgptseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Calliope Safe to Use in 2026?

Generally Safe

Score 100/100

Calliope has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The Calliope plugin v3.2.0 presents a generally strong security posture, built upon good development practices. The static analysis reveals a robust implementation regarding SQL query safety, with all queries utilizing prepared statements, and all output is properly escaped, significantly mitigating common web application vulnerabilities like SQL injection and XSS. The absence of any recorded vulnerabilities in its history further reinforces this positive outlook, suggesting a mature and well-maintained codebase.

However, a few areas warrant attention. The presence of a dangerous function, specifically `preg_replace(/e)`, while not explicitly flagged by taint analysis in this run, is a known risk for potential remote code execution if not handled with extreme care and proper sanitization of user-supplied input. While the plugin has no unprotected entry points, the fact that there are zero capability checks across its attack surface is a notable weakness. This means that all AJAX handlers, despite being protected by nonces, can be accessed by any logged-in user, regardless of their role or permissions, which could lead to privilege escalation or unauthorized actions if the logic within those handlers is not sufficiently restrictive.

In conclusion, Calliope v3.2.0 is a plugin that has invested in secure coding principles, particularly in data handling and output sanitization. The lack of historical vulnerabilities is a significant strength. The primary concerns lie with the potential for issues arising from the `preg_replace(/e)` function and, more importantly, the complete absence of capability checks, which represents a gap in access control for its AJAX endpoints. Addressing these would elevate the plugin's security to an even higher standard.

Key Concerns

  • Dangerous function (preg_replace(/e)) found
  • No capability checks on AJAX handlers
Vulnerabilities
None known

Calliope Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Calliope Release Timeline

v3.2.0Current
v3.1.2
v3.1.1
v3.1.0
v3.0.17
v3.0.16
v3.0.15
v3.0.14
v3.0.13
v3.0.12
v3.0.11
v3.0.10
v3.0.9
v3.0.8
v3.0.7
v3.0.6
Code Analysis
Analyzed Apr 16, 2026

Calliope Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
72 prepared
Unescaped Output
0
977 escaped
Nonce Checks
5
Capability Checks
0
File Operations
2
External Requests
5
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace('/esrc/Utils/Utils.php:136

SQL Query Safety

100% prepared72 total queries

Output Escaping

100% escaped977 total outputs
Attack Surface

Calliope Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_feed_edit_page_test_autogen_ajax_requestsrc/Admin/Pages/FeedEditPage.php:34
noprivwp_ajax_feed_edit_page_test_autogen_ajax_requestsrc/Admin/Pages/FeedEditPage.php:35
authwp_ajax_feed_edit_page_related_keyword_generate_ajax_requestsrc/Admin/Pages/FeedEditPage.php:38
noprivwp_ajax_feed_edit_page_related_keyword_generate_ajax_requestsrc/Admin/Pages/FeedEditPage.php:39
WordPress Hooks 6
actionupgrader_process_completecalliope.php:116
actioninitcalliope.php:123
filtercron_schedulescalliope.php:150
actioncalliope_cron_schedulercalliope.php:163
actionadmin_enqueue_scriptscalliope.php:170
actionadmin_menusrc/Admin/MenuManager.php:30

Scheduled Events 2

calliope_cron_scheduler
calliope_cron_scheduler
Maintenance & Trust

Calliope Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 23, 2026
PHP min version7.4
Downloads536

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Calliope Developer Profile

homio13

1 plugin · 0 total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
773 days
View full developer profile
Detection Fingerprints

How We Detect Calliope

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/calliope/assets/css/style.css/wp-content/plugins/calliope/assets/js/script.js
Script Paths
/wp-content/plugins/calliope/assets/js/script.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Calliope