Client Power Tools Portal Security & Risk Analysis

wordpress.org/plugins/client-power-tools

A free, easy-to-use client portal built for designers, developers, consultants, lawyers, and other independent contractors and professionals.

40 active installs v1.11.6 PHP 7.4+ WP 5.5+ Updated Unknown
client-managementfrontend-loginportalproject-managementrestrict-content
99
A · Safe
CVEs total1
Unpatched0
Last CVEOct 21, 2024
Safety Verdict

Is Client Power Tools Portal Safe to Use in 2026?

Generally Safe

Score 99/100

Client Power Tools Portal has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 21, 2024
Risk Assessment

The "client-power-tools" plugin v1.11.6 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices in its handling of SQL queries, exclusively using prepared statements, and all output is properly escaped. This significantly mitigates risks of SQL injection and Cross-Site Scripting (XSS) originating from these areas. The plugin also includes a substantial number of nonce and capability checks, indicating an effort to secure its functionality.

However, a significant concern arises from the attack surface. Five out of seven identified entry points, all of which are AJAX handlers, lack authentication checks. This presents a substantial risk, as any unauthenticated user could potentially interact with these handlers, leading to unintended actions or information disclosure depending on the specific functionality they expose. While the taint analysis did not reveal critical or high-severity issues, the presence of unsanitized paths in all analyzed flows warrants attention, even if they did not immediately translate to exploitable vulnerabilities in this version.

The vulnerability history shows one medium-severity CVE related to XSS, which was patched. The fact that it was a medium-severity XSS vulnerability, and that it is now patched, suggests the developers are responsive to security issues. However, it also highlights a past susceptibility to input neutralization flaws. In conclusion, while the plugin has strong foundations in data handling and escaping, the lack of authentication on a majority of its AJAX endpoints is a critical weakness that requires immediate remediation.

Key Concerns

  • 5 AJAX handlers without auth checks
  • Taint flows with unsanitized paths
  • Past medium severity XSS vulnerability
Vulnerabilities
1

Client Power Tools Portal Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-49670medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Client Power Tools Portal <= 1.9.0 - Reflected Cross-Site Scripting

Oct 21, 2024 Patched in 1.9.1 (10d)
Code Analysis
Analyzed Mar 16, 2026

Client Power Tools Portal Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
2
556 escaped
Nonce Checks
19
Capability Checks
12
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

100% escaped558 total outputs
Data Flows
8 unsanitized

Data Flow Analysis

8 flows8 with unsanitized paths
cpt_process_delete_project (admin\cpt-edit-project.php:160)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
5 unprotected

Client Power Tools Portal Attack Surface

Entry Points7
Unprotected5

AJAX Handlers 5

authwp_ajax_cpt_update_stage_selectcommon\cpt-common-projects.php:318
noprivwp_ajax_cpt_update_stage_selectcommon\cpt-common-projects.php:319
noprivwp_ajax_send_login_codecommon\cpt-login.php:16
noprivwp_ajax_check_login_codecommon\cpt-login.php:96
noprivwp_ajax_check_passwordcommon\cpt-login.php:170

Shortcodes 2

[status-update-request-button] shortcodes.php:18
[client-dashboard] shortcodes.php:36
WordPress Hooks 39
actionadmin_noticesadmin\cpt-admin.php:15
actionadmin_noticesadmin\cpt-admin.php:42
actionadmin_menuadmin\cpt-admin.php:109
actionwp_mail_failedadmin\cpt-admin.php:286
actionadmin_initadmin\cpt-client-managers.php:15
actionadmin_post_cpt_new_client_manager_addedadmin\cpt-client-managers.php:213
actionadmin_post_cpt_client_updatedadmin\cpt-edit-client.php:15
actionadmin_post_cpt_client_deletedadmin\cpt-edit-client.php:143
actionadmin_post_cpt_project_updatedadmin\cpt-edit-project.php:72
actionadmin_post_cpt_project_deletedadmin\cpt-edit-project.php:156
actionadmin_post_cpt_project_undeletedadmin\cpt-edit-project.php:237
actionadmin_post_cpt_project_permadeletedadmin\cpt-edit-project.php:322
actionadmin_post_cpt_new_client_addedadmin\cpt-new-client.php:15
actionadmin_post_cpt_new_project_addedadmin\cpt-new-project.php:15
actionadmin_initadmin\cpt-project-types.php:15
actionadmin_post_cpt_new_project_type_addedadmin\cpt-project-types.php:158
actionadmin_post_cpt_project_type_editedadmin\cpt-project-types.php:210
actionadmin_initadmin\cpt-settings.php:61
actionadmin_initadmin\cpt-settings.php:254
actionadmin_initadmin\cpt-settings.php:328
actionadmin_initadmin\cpt-settings.php:442
actionadmin_initadmin\cpt-settings.php:526
actionadmin_initadmin\cpt-settings.php:692
actionwp_enqueue_scriptsclient-power-tools.php:36
actionadmin_enqueue_scriptsclient-power-tools.php:37
actionwp_enqueue_scriptsclient-power-tools.php:62
actionadmin_enqueue_scriptsclient-power-tools.php:119
actioninitclient-power-tools.php:221
actioninitclient-power-tools.php:295
actioninitclient-power-tools.php:368
actionadmin_post_cpt_new_message_addedcommon\cpt-common-messages.php:283
actioninitcommon\cpt-common.php:13
actionadmin_noticescommon\cpt-common.php:588
actionadmin_post_cpt_status_update_requestedcommon\cpt-status-update-request-button.php:122
actionwp_headfrontend\cpt-client-dashboard.php:15
filterthe_contentfrontend\cpt-client-dashboard.php:25
filterbody_classfrontend\cpt-frontend.php:15
actionwp_footerfrontend\cpt-frontend.php:50
filterthe_titlefrontend\cpt-frontend.php:161
Maintenance & Trust

Client Power Tools Portal Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.4
Downloads7K

Community Trust

Rating100/100
Number of ratings2
Active installs40
Developer Profile

Client Power Tools Portal Developer Profile

Sam Glover

2 plugins · 40 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
10 days
View full developer profile
Detection Fingerprints

How We Detect Client Power Tools Portal

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/client-power-tools/assets/css/common.css/wp-content/plugins/client-power-tools/assets/js/cpt-common.js/wp-content/plugins/client-power-tools/assets/css/frontend.css/wp-content/plugins/client-power-tools/assets/js/cpt-login-modal.js/wp-content/plugins/client-power-tools/assets/js/cpt-notices.js/wp-content/plugins/client-power-tools/assets/js/cpt-prevent-offscreen-submenus.js/wp-content/plugins/client-power-tools/assets/css/admin.css/wp-content/plugins/client-power-tools/assets/js/cpt-admin.js+2 more
Script Paths
/wp-content/plugins/client-power-tools/assets/js/cpt-common.js/wp-content/plugins/client-power-tools/assets/js/cpt-login-modal.js/wp-content/plugins/client-power-tools/assets/js/cpt-notices.js/wp-content/plugins/client-power-tools/assets/js/cpt-prevent-offscreen-submenus.js/wp-content/plugins/client-power-tools/assets/js/cpt-admin.js/wp-content/plugins/client-power-tools/assets/js/cpt-types.js+1 more
Version Parameters
client-power-tools=1.11.6cpt-common=1.11.6cpt-login-modal=1.11.6cpt-notices=1.11.6cpt-prevent-offscreen-submenus=1.11.6cpt-admin=1.11.6cpt-types=1.11.6cpt-stages=1.11.6

HTML / DOM Fingerprints

CSS Classes
cpt-notice
HTML Comments
<!-- Ensures the WP_List_Table class is available --><!-- Only loads CPT admin styles and scripts on CPT admin pages --><!-- Translators: %1$s and %2$s are `<a>` tags that link to the settings page -->
Data Attributes
cpt
JS Globals
cpt_varsvars
FAQ

Frequently Asked Questions about Client Power Tools Portal