click-to-vote.me Security & Risk Analysis

wordpress.org/plugins/click-to-vote-me

Very easy to use WordPress plugin to display click-to-vote.me polls.

10 active installs v21.3.13 PHP + WP + Updated Mar 17, 2021
video-lightboxwordpress-lightboxwordpress-video-embedwordpress-video-lightboxwp-video-lightbox
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is click-to-vote.me Safe to Use in 2026?

Generally Safe

Score 85/100

click-to-vote.me has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The click-to-vote-me v21.3.13 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query handling by exclusively using prepared statements and has no recorded historical vulnerabilities, suggesting a generally stable development history. However, significant concerns arise from the lack of output escaping, where none of the identified output points are properly escaped. Additionally, the presence of unsanitized paths in taint analysis, even if not categorized as critical or high severity, indicates potential for unintended behavior or manipulation if user-supplied data is involved.

While the attack surface is small and appears to lack direct entry points without authentication or permission checks, the critical finding of unsanitized paths in taint analysis, coupled with the complete absence of output escaping, presents a notable risk. This suggests that data processed by the plugin might not be adequately validated or sanitized before being displayed, potentially leading to cross-site scripting (XSS) vulnerabilities if the plugin handles user-supplied input or dynamically generated content that is then rendered without proper sanitization. The lack of nonce checks and capability checks, while not directly flagged as problematic in this specific analysis, further contributes to a less robust security framework.

Key Concerns

  • No output escaping implemented
  • Taint analysis shows unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

click-to-vote.me Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

click-to-vote.me Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
display_settings_page (settings.php:12)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

click-to-vote.me Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[click-to-vote] click-to-vote.php:13
WordPress Hooks 1
actionadmin_menusettings.php:3
Maintenance & Trust

click-to-vote.me Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMar 17, 2021
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

click-to-vote.me Developer Profile

trollderiu

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect click-to-vote.me

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
click-to-vote-me/click-to-vote.php?ver=21.3.13

HTML / DOM Fingerprints

Shortcode Output
<iframe width= height= src= frameborder='0'></iframe>
FAQ

Frequently Asked Questions about click-to-vote.me