Chat-In Inc Security & Risk Analysis

wordpress.org/plugins/chat-in

Chat-In es una solucion integral al momento de obtener contactos de tu página.

10 active installs v1.0.0 PHP 5.6+ WP 3.3+ Updated Unknown
assitantbotchatbotcontact-formleads
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Chat-In Inc Safe to Use in 2026?

Generally Safe

Score 100/100

Chat-In Inc has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "chat-in" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, external HTTP requests, file operations, and SQL queries (all prepared) are excellent indicators of good development practices. Furthermore, the high percentage of properly escaped outputs suggests an effort to prevent cross-site scripting (XSS) vulnerabilities.

However, a significant concern arises from the lack of nonce and capability checks across all identified entry points, including the single shortcode. While the static analysis did not find any specific taint flows or dangerous functions in this version, the absence of these fundamental security controls leaves the plugin vulnerable to cross-site request forgery (CSRF) attacks and unauthorized privilege escalation if the shortcode performs any sensitive actions. The lack of any recorded vulnerability history is positive, but it doesn't negate the inherent risks associated with unchecked entry points.

In conclusion, "chat-in" v1.0.0 benefits from a clean codebase regarding SQL and output handling. Nevertheless, the critical omission of nonce and capability checks on its sole entry point represents a notable weakness that attackers could potentially exploit. Addressing these missing checks is paramount to improving the plugin's overall security.

Key Concerns

  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

Chat-In Inc Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Chat-In Inc Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

Chat-In Inc Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[chatin-contact-form] chatin.php:25
WordPress Hooks 4
actionadmin_menuchatin.php:14
actionwp_enqueue_scriptschatin.php:19
actionadmin_initchatin.php:21
filterscript_loader_tagchatin.php:32
Maintenance & Trust

Chat-In Inc Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Chat-In Inc Developer Profile

cteamcom

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Chat-In Inc

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://cincosi.com/uploads/js/C-chat.jshttps://cincosi.com/tickets/js/tickets.js

HTML / DOM Fingerprints

Data Attributes
data-namedata-number
Shortcode Output
<div id="
FAQ

Frequently Asked Questions about Chat-In Inc