Click to map for Elementor Security & Risk Analysis

wordpress.org/plugins/click-to-map-for-elementor

Elementor control that will load a Google Maps iframe after clicking "accept" - no external data is loaded before clicking it.

0 active installs v1.2.2 PHP 7.2+ WP 5.2+ Updated Unknown
addonselementorelementor-addonselementswidgets
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Click to map for Elementor Safe to Use in 2026?

Generally Safe

Score 100/100

Click to map for Elementor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plugin 'click-to-map-for-elementor' v1.2.2 exhibits a very strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code demonstrates good practices by not utilizing dangerous functions, performing file operations, or making external HTTP requests. The fact that all SQL queries use prepared statements is also a positive indicator of secure coding. The lack of any recorded vulnerabilities, including CVEs, further reinforces this strong security standing.

However, a few areas warrant careful consideration. The analysis shows a concerning absence of nonce checks and capability checks across all entry points. While the current entry point count is zero, if any were to be introduced without proper authorization, this lack of checks could present a significant risk. Additionally, 25% of output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is involved in these outputs. The lack of taint analysis results is also noteworthy; while it might indicate no flows were found, it could also mean the analysis itself was limited.

Overall, the plugin is commendably secure in its current state, with no identified vulnerabilities and a limited attack surface. The developers have demonstrated good practices regarding SQL and dangerous functions. The primary weaknesses lie in the potential for future vulnerabilities due to the lack of authorization checks on potential entry points and the presence of unescaped output. These are areas to monitor closely should the plugin be updated or expanded.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Unescaped output (1 out of 4)
Vulnerabilities
None known

Click to map for Elementor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Click to map for Elementor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

Click to map for Elementor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptselementor_click_to_map.php:22
actioninitelementor_click_to_map.php:32
Maintenance & Trust

Click to map for Elementor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.2
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Click to map for Elementor Developer Profile

Michael

7 plugins · 10K total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Click to map for Elementor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/click-to-map-for-elementor/styles/main.css

HTML / DOM Fingerprints

CSS Classes
click__mapclick__map__text__content
Data Attributes
data-elementor-open-widget-settings
FAQ

Frequently Asked Questions about Click to map for Elementor