
ClickDesigns Security & Risk Analysis
wordpress.org/plugins/clickdesignsThe number one design software for marketers and entrepreneurs who want to create incredible graphics and designs in minutes for their websites.
Is ClickDesigns Safe to Use in 2026?
Generally Safe
Score 91/100ClickDesigns has a strong security track record. Known vulnerabilities have been patched promptly.
This plugin exhibits a generally strong security posture, with a clean bill of health from static and taint analysis. The absence of dangerous functions, raw SQL queries, unsanitized paths in taint flows, and file operations are significant strengths. Furthermore, the presence of nonce and capability checks on all identified AJAX handlers indicates a commitment to protecting entry points. The plugin also demonstrates good output escaping practices, with 80% of outputs being properly escaped.
However, the plugin's vulnerability history presents a notable concern. While there are no currently unpatched CVEs, the presence of one past CVE, specifically a 'Missing Authorization' type, suggests a recurring area of weakness that requires ongoing vigilance. The fact that the last vulnerability was in January 2025, while the current date is likely earlier, implies it might be a future vulnerability or a data entry error, but it still points to past issues in this category. The 11 external HTTP requests, while not inherently a vulnerability, represent a potential attack vector if any of the external services are compromised or if the data sent to them is not handled securely.
In conclusion, ClickDesigns v2.0.0 demonstrates many good security practices, particularly in its static code analysis. The primary area of concern lies in its past vulnerability history, specifically related to missing authorization. While no current vulnerabilities are flagged, this pattern warrants careful monitoring and assurance that past issues have been thoroughly addressed and prevented from recurring. The external HTTP requests are a minor point of attention but not a significant immediate risk.
Key Concerns
- Past CVE for Missing Authorization
- 11 External HTTP requests
ClickDesigns Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
ClickDesigns <= 1.8.0 - Missing Authorization to API Key Modification or Removal
ClickDesigns Code Analysis
Output Escaping
Data Flow Analysis
ClickDesigns Attack Surface
AJAX Handlers 22
WordPress Hooks 7
Maintenance & Trust
ClickDesigns Maintenance & Trust
Maintenance Signals
Community Trust
ClickDesigns Alternatives
MainWP Child Reports
mainwp-child-reports
The MainWP Child Report plugin tracks changes to Child sites for the Pro Reports Extension.
SlimStat Analytics
wp-slimstat
The leading web analytics plugin for WordPress
Metorik – Reports & Email Automation for WooCommerce
metorik-helper
The Metorik Helper helps provide your WooCommerce store with powerful analytics, reports, and tools.
Logos Reftagger
reftagger
Logos Reftagger turns Bible references into links to the verse on Biblia.com and adds tooltips with the text of the verse.
WP Client Reports
wp-client-reports
The best maintenance reporting tool for WordPress professionals. Display update statistics directly in the WordPress admin or send reports via email.
ClickDesigns Developer Profile
1 plugin · 100 total installs
How We Detect ClickDesigns
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/clickdesigns/assets/images/refresh.svgHTML / DOM Fingerprints
cd_media_wrappercd-media-sectioncd-top-divcd-media-tabcd-btncd-api-buttonscd-data-filtercds-btn+15 moredata-typesdata-keysdata-id/v1/getMyImage/v1/getAgencyUser