Chimney Rock Support Tickets Security & Risk Analysis

wordpress.org/plugins/chimney-rock-support-tickets

Create and manage support tickets for your customers or subscribers with ease.

0 active installs v1.3.3 PHP 7.0+ WP 4.7+ Updated Nov 29, 2023
helpdesksupportsupport-ticketticket-systemtickets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Chimney Rock Support Tickets Safe to Use in 2026?

Generally Safe

Score 85/100

Chimney Rock Support Tickets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "chimney-rock-support-tickets" plugin v1.3.3 exhibits a generally good security posture with several positive indicators. The static analysis reveals no critical or high severity taint flows, a low number of AJAX and REST API entry points with all identified ones protected by authentication checks, and a high percentage of properly escaped outputs. The presence of nonce checks and capability checks further strengthens its defenses against common web attacks. The plugin also has no recorded vulnerabilities or CVEs, suggesting a history of stable and secure development.

However, there are a few areas that warrant attention. The presence of one flow with unsanitized paths in the taint analysis, while not rated as critical or high, indicates a potential for path traversal vulnerabilities if exploited correctly. Additionally, 50% of SQL queries are not using prepared statements, which increases the risk of SQL injection, especially if the plugin handles user-supplied data in these queries. The single file operation and external HTTP request, while not inherently risky, are potential vectors for further exploitation if not handled with extreme care and robust sanitization.

In conclusion, the plugin is reasonably well-secured, demonstrating good practices in output escaping and authentication. The lack of historical vulnerabilities is a strong positive. The primary concerns stem from the potential for unsanitized path flows and the use of non-prepared SQL statements. Addressing these specific code signals would further enhance the plugin's security.

Key Concerns

  • Flows with unsanitized paths
  • SQL queries not using prepared statements
Vulnerabilities
None known

Chimney Rock Support Tickets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Chimney Rock Support Tickets Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
4 prepared
Unescaped Output
11
176 escaped
Nonce Checks
5
Capability Checks
3
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

50% prepared8 total queries

Output Escaping

94% escaped187 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

4 flows1 with unsanitized paths
isPassedCaptcha (inc\tickets.php:1039)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Chimney Rock Support Tickets Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 3

authwp_ajax_crm_tickets_view_tickets_actioninc\process.ajax.php:15
authwp_ajax_crm_tickets_add_role_actioninc\process.ajax.php:16
authwp_ajax_crm_tickets_delete_role_actioninc\process.ajax.php:17

Shortcodes 1

[crm_support_tickets] inc\tickets.php:40
WordPress Hooks 26
filterbulk_actions-edit-crm_support_ticketadmin\class-bulk-actions.php:15
filterviews_edit-crm_support_ticketadmin\class-bulk-actions.php:16
filterhandle_bulk_actions-edit-crm_support_ticketadmin\class-bulk-actions.php:17
actionrestrict_manage_postsadmin\class_filters.php:15
filterparse_queryadmin\class_filters.php:16
actioncurrent_screenadmin\class_modals.php:14
actioncurrent_screenadmin\class_modals.php:15
actionadmin_headadmin\class_modals.php:22
actionadmin_headadmin\class_modals.php:31
actionwp_enqueue_scriptsfunctions.php:38
actionadmin_enqueue_scriptsfunctions.php:39
actioninitfunctions.php:83
actionafter_delete_postinc\db.php:13
actionplugins_loadedinc\init.php:21
actioninitinc\tickets.php:37
actionadmin_menuinc\tickets.php:43
actionadd_meta_boxesinc\tickets.php:46
actionsave_post_crm_support_ticketinc\tickets.php:49
actionadmin_initinc\tickets.php:52
filterwp_insert_post_datainc\tickets.php:54
filtermanage_edit-crm_support_ticket_columnsinc\tickets.php:57
actionmanage_crm_support_ticket_posts_custom_columninc\tickets.php:58
filterwp_mail_from_nameinc\tickets.php:1518
filterwp_mail_frominc\tickets.php:1519
filterwp_mail_from_nameinc\tickets.php:1575
filterwp_mail_frominc\tickets.php:1576
Maintenance & Trust

Chimney Rock Support Tickets Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 29, 2023
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Chimney Rock Support Tickets Developer Profile

Steve

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Chimney Rock Support Tickets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/chimney-rock-support-tickets/assets/css/admin.css/wp-content/plugins/chimney-rock-support-tickets/assets/css/frontend.css/wp-content/plugins/chimney-rock-support-tickets/assets/js/frontend.js
Script Paths
/wp-content/plugins/chimney-rock-support-tickets/assets/js/frontend.js
Version Parameters
chimney-rock-support-tickets/assets/css/admin.css?ver=chimney-rock-support-tickets/assets/css/frontend.css?ver=chimney-rock-support-tickets/assets/js/frontend.js?ver=

HTML / DOM Fingerprints

JS Globals
frontend
Shortcode Output
<p>Add this shortcode to any page to display tickets</p> <p>[crm_support_tickets]</p>
FAQ

Frequently Asked Questions about Chimney Rock Support Tickets