CallRoot Security & Risk Analysis

wordpress.org/plugins/callroot

CallRoot wordpress plugin facilitates Dynamic Number Insertion (DNI), i.e., it automatically inserts the javascript code for swapping phone numbers in …

10 active installs v1.1 PHP 5.5.9+ WP 4.9+ Updated Mar 26, 2018
call-trackingcampaign-trackingdnidynamic-number-insertionmarketing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CallRoot Safe to Use in 2026?

Generally Safe

Score 85/100

CallRoot has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'callroot' plugin version 1.1 exhibits a generally strong security posture based on the provided static analysis. The complete absence of known vulnerabilities in its history is a positive indicator, suggesting a history of responsible development and maintenance. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries, avoiding dangerous function calls, and not performing file operations. The presence of nonce and capability checks, along with the limited external HTTP request, further contributes to a favorable security profile.

However, there are areas that warrant attention. The output escaping is only 40% properly implemented, meaning a significant portion of dynamic output might be vulnerable to cross-site scripting (XSS) attacks if the data originates from user input or untrusted sources. While the attack surface appears minimal with 0 entry points, the single external HTTP request is an area where vulnerabilities could potentially be introduced if the external service is compromised or if the request itself is not handled securely. The lack of taint analysis data could also mean that potential vulnerabilities in this area were not explored or are not present in this specific analysis run.

In conclusion, 'callroot' v1.1 is a relatively secure plugin with excellent historical vulnerability data and strong SQL query handling. The primary concern lies with the partial output escaping, which could lead to XSS vulnerabilities. The single external HTTP request should be monitored for secure implementation. Overall, the plugin presents a low to moderate risk, with the potential for improvement in output sanitization.

Key Concerns

  • Output escaping is only 40% properly implemented
  • One external HTTP request without further context
Vulnerabilities
None known

CallRoot Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CallRoot Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

40% escaped5 total outputs
Attack Surface

CallRoot Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initcallroot.php:82
actionadmin_menucallroot.php:83
actionwp_print_footer_scriptscallroot.php:84
actionactivated_plugincallroot.php:85
Maintenance & Trust

CallRoot Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMar 26, 2018
PHP min version5.5.9
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CallRoot Developer Profile

callroot

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CallRoot

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://callroot.com/jcm.js

HTML / DOM Fingerprints

JS Globals
jcmjs
FAQ

Frequently Asked Questions about CallRoot