TalkToMe – user inputs & polls Security & Risk Analysis

wordpress.org/plugins/crowd

TalkToMe lets you create and add cards to your contents for polls or similar community input.

10 active installs v1.0.8 PHP + WP 4.0+ Updated Jul 31, 2017
community
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TalkToMe – user inputs & polls Safe to Use in 2026?

Generally Safe

Score 85/100

TalkToMe – user inputs & polls has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin "crowd" v1.0.8 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points suggests a limited attack surface. Furthermore, the code's use of prepared statements for all SQL queries and the presence of nonce and capability checks are positive indicators of secure development practices. The lack of any reported vulnerabilities or CVEs also contributes to a favorable impression.

However, a significant concern is the low percentage (9%) of properly escaped output. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities where user-supplied data might be rendered directly in the browser without adequate sanitization. While no taint flows were identified in this analysis, this output escaping issue presents a clear and present danger that could be exploited if an attacker can inject malicious scripts. The single file operation, while not inherently problematic, warrants attention to ensure it's handled securely and doesn't lead to unauthorized file access or modification.

In conclusion, while "crowd" v1.0.8 benefits from a small attack surface and good database query practices, the prevalent lack of output escaping is a critical weakness. The vulnerability history is clean, which is excellent, but it doesn't mitigate the risks identified in the static analysis. Addressing the output escaping is paramount to improving the plugin's security.

Key Concerns

  • Low output escaping percentage
  • Presence of file operations
Vulnerabilities
None known

TalkToMe – user inputs & polls Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

TalkToMe – user inputs & polls Release Timeline

v1.0.8Current
v1.0.6
v1.0.4
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Apr 16, 2026

TalkToMe – user inputs & polls Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
39
4 escaped
Nonce Checks
2
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

9% escaped43 total outputs
Attack Surface

TalkToMe – user inputs & polls Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 24
actiongrid_load_classesgrid/grid.php:16
filtergrid_templates_pathsgrid/grid.php:17
actioninitinc/card-classes.php:16
actioninitinc/card-post-type.php:19
actionrestrict_manage_postsinc/card-post-type.php:31
filterparse_queryinc/card-post-type.php:32
filterembed_oembed_htmlinc/embed.php:19
filterembed_htmlinc/embed.php:20
filtertemplate_includeinc/embed.php:25
actioninitinc/endpoint.php:44
filterquery_varsinc/endpoint.php:45
actioninitinc/endpoint.php:46
actionparse_requestinc/endpoint.php:47
actionparse_queryinc/endpoint.php:49
actionadmin_menuinc/menu.php:17
actionadd_meta_boxesinc/meta-box/card-config.php:25
actionsave_postinc/meta-box/card-config.php:26
actionsave_postinc/meta-box/cards-to-post.php:24
actionsave_postinc/meta-box/initiator.php:21
actionsave_postinc/meta-box/lifecycle.php:23
actionadd_meta_boxesinc/meta-box.php:31
filterthe_contentinc/post.php:23
actionthe_contentinc/render.php:17
actionadmin_menuinc/settings.php:24
Maintenance & Trust

TalkToMe – user inputs & polls Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 31, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

TalkToMe – user inputs & polls Developer Profile

EdwardBock

24 plugins · 1K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
107 days
View full developer profile
Detection Fingerprints

How We Detect TalkToMe – user inputs & polls

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/crowd/css/meta-box-card-editor.css/wp-content/plugins/crowd/js/card-editor.js
Script Paths
/wp-content/plugins/crowd/js/card-editor.js
Version Parameters
/wp-content/plugins/crowd/js/card-editor.js?ver=

HTML / DOM Fingerprints

CSS Classes
crowd-card-editor
Data Attributes
id="crowd-card-editor"
JS Globals
Crowd_CardEditor
FAQ

Frequently Asked Questions about TalkToMe – user inputs & polls