CXTailor Funnels Security & Risk Analysis

wordpress.org/plugins/cxtailor-funnels

Edit customer journeys, video funnels and CX Tailor experiences directly from WordPress without switching between platforms.

0 active installs v1.0.0 PHP 7.4+ WP 6.0+ Updated Dec 29, 2025
customer-journeycx-tailorfunnelsno-codevideo-funnels
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CXTailor Funnels Safe to Use in 2026?

Generally Safe

Score 100/100

CXTailor Funnels has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "cxtailor-funnels" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. It demonstrates good practices by ensuring all SQL queries utilize prepared statements and all output is properly escaped, eliminating common web vulnerabilities like SQL injection and cross-site scripting (XSS) through these avenues. Furthermore, the absence of dangerous functions, file operations, and bundled libraries reduces the potential for complex code-level exploits.

However, there are a few areas that warrant attention. The presence of two REST API routes without explicit permission callbacks, while not immediately exploitable without further context, represents an potential area for unauthorized access if not properly secured by WordPress's default capabilities or custom checks within the plugin's logic. The plugin also makes two external HTTP requests, which, if not carefully managed, could be a vector for server-side request forgery (SSRF) or data exfiltration if the target URLs are untrusted or compromised. The lack of nonce checks on AJAX handlers, although there are none in this version, is a significant security gap that would be concerning if AJAX functionality were introduced in future versions without proper implementation.

The plugin's vulnerability history is remarkably clean, with no recorded CVEs. This indicates a potential for well-written code or a lack of extensive security auditing. Coupled with the clean taint analysis results, this suggests the current version is likely safe from known complex vulnerabilities. However, the absence of vulnerabilities does not guarantee future safety, and the identified potential weaknesses in the REST API and external requests should be addressed proactively. Overall, the plugin has a good foundation, but minor improvements in authentication for API routes and careful management of external requests would further bolster its security.

Key Concerns

  • REST API routes without permission callbacks
  • External HTTP requests
Vulnerabilities
None known

CXTailor Funnels Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CXTailor Funnels Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
29 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped29 total outputs
Attack Surface

CXTailor Funnels Attack Surface

Entry Points3
Unprotected0

REST API Routes 2

POST/wp-json/cxtailor/v1/loginincludes\class-cxtf-api.php:11
GET/wp-json/cxtailor/v1/funnelsincludes\class-cxtf-api.php:17

Shortcodes 1

[CXFunnel] includes\class-cxtf-content.php:11
WordPress Hooks 6
actionplugins_loadedcxtailor-funnels.php:35
actioninitcxtailor-funnels.php:41
actionadmin_menuincludes\class-cxtf-admin.php:10
actionadmin_initincludes\class-cxtf-admin.php:11
actionrest_api_initincludes\class-cxtf-api.php:7
filterthe_contentincludes\class-cxtf-content.php:10
Maintenance & Trust

CXTailor Funnels Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 29, 2025
PHP min version7.4
Downloads113

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

CXTailor Funnels Developer Profile

cxtailorik

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CXTailor Funnels

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cxtailor-funnels/assets/block.js/wp-content/plugins/cxtailor-funnels/assets/block.css
Script Paths
https://admin.cxtailor.com/cxtailorfunnel.js
Version Parameters
cxtailor-funnels/assets/block.js?ver=cxtailor-funnels/assets/block.css?ver=

HTML / DOM Fingerprints

CSS Classes
cxtf-editor-placeholdercxtailor-embed-wrappercxtailor-embedcxtailor-funnel
Data Attributes
data-funnel-id
JS Globals
CXTfGlobals
REST Endpoints
/wp-json/cxtailor/v1/login/wp-json/cxtailor/v1/funnels
Shortcode Output
<div class="cxtf-editor-placeholder"><strong>CX Tailor Funnel</strong><br/><div class="cxtailor-embed-wrapper"<div class="cxtailor-embed"
FAQ

Frequently Asked Questions about CXTailor Funnels