Chameleon Security & Risk Analysis

wordpress.org/plugins/chameleon

A great WordPress plugin which helps you to choose a unique style for your favorite plugins and themes.

200 active installs v1.4.9 PHP 7.0+ WP 3.0.1+ Updated Jul 19, 2025
alphabeticchameleoncontact-formrss-feedthemes-and-skins
100
A · Safe
CVEs total1
Unpatched0
Last CVENov 11, 2022
Safety Verdict

Is Chameleon Safe to Use in 2026?

Generally Safe

Score 100/100

Chameleon has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 11, 2022Updated 8mo ago
Risk Assessment

The "chameleon" plugin v1.4.9 exhibits a generally good security posture with several positive indicators. The static analysis reveals a small attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes. The absence of critical or high severity taint flows is also a strong positive sign, indicating that user-supplied data is generally handled safely within the analyzed flows.

However, there are areas that warrant attention. The plugin performs raw SQL queries without using prepared statements, which can be a vector for SQL injection vulnerabilities if the input is not properly sanitized before being used in the query. While the output escaping is high (90%), the remaining 10% could still pose a risk for Cross-Site Scripting (XSS) if those unescaped outputs are triggered by user-controlled data. The plugin also bundles an outdated version of jQuery (v1.10.2), which may contain known vulnerabilities not directly attributable to this plugin but could still be exploited in conjunction with its functionalities.

The vulnerability history shows one previous medium severity CVE related to XSS, which was patched. The fact that there are no currently unpatched vulnerabilities is encouraging. However, the past XSS vulnerability, combined with the potential for unescaped output in the current version, suggests that XSS remains a potential concern if developer diligence wavers. Overall, the plugin is relatively secure but requires careful monitoring and potential remediation for raw SQL queries and the bundled outdated library.

Key Concerns

  • Raw SQL query without prepared statements
  • Bundled outdated jQuery library v1.10.2
  • Potential for unescaped output (10%)
Vulnerabilities
1

Chameleon Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2022-44736medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Chameleon <= 1.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting

Nov 11, 2022 Patched in 1.4.4 (438d)
Code Analysis
Analyzed Mar 16, 2026

Chameleon Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
14
128 escaped
Nonce Checks
3
Capability Checks
2
File Operations
9
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery1.10.2

SQL Query Safety

0% prepared1 total queries

Output Escaping

90% escaped142 total outputs
Data Flows
All sanitized

Data Flow Analysis

3 flows
after_wpch_form_wrap_news_ticker (inc\functions.php:7)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Chameleon Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[WPCH_NEWS_TICKER] inc\functions.php:41
WordPress Hooks 11
actionwp_footerinc\functions.php:89
actionwpinc\functions.php:555
actionwidgets_initinc\functions.php:556
actionbp_setup_navinc\functions.php:826
actionbp_template_contentinc\functions.php:829
actioninitindex.php:257
actionadmin_enqueue_scriptsindex.php:259
actionwp_enqueue_scriptsindex.php:260
actionadmin_menuindex.php:266
actionadmin_initindex.php:269
actionwp_footerindex.php:273
Maintenance & Trust

Chameleon Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 19, 2025
PHP min version7.0
Downloads31K

Community Trust

Rating68/100
Number of ratings5
Active installs200
Developer Profile

Chameleon Developer Profile

Fahad Mahmood

40 plugins · 33K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
237 days
View full developer profile
Detection Fingerprints

How We Detect Chameleon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/chameleon/assets/css/animate.min.css/wp-content/plugins/chameleon/assets/css/bootstrap.min.css/wp-content/plugins/chameleon/assets/css/colorpicker.css/wp-content/plugins/chameleon/assets/css/cropper.min.css/wp-content/plugins/chameleon/assets/css/datatables.min.css/wp-content/plugins/chameleon/assets/css/magnific-popup.css/wp-content/plugins/chameleon/assets/css/owl.carousel.min.css/wp-content/plugins/chameleon/assets/css/plugins.css+32 more
Script Paths
/wp-content/plugins/chameleon/assets/js/custom.js/wp-content/plugins/chameleon/js/admin.js
Version Parameters
chameleon/assets/css/style.css?ver=chameleon/assets/js/custom.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpc-theme-editor-wrapper
JS Globals
wpc_datawpc_supportedwpc_plugins_activatedwpc_all_pluginswpc_assets_loadedwpc_dir+1 more
FAQ

Frequently Asked Questions about Chameleon