
Direktt Security & Risk Analysis
wordpress.org/plugins/direkttConnect your WordPress site to the Direktt mobile customer care platform for instant messaging and real-time user engagement.
Is Direktt Safe to Use in 2026?
Generally Safe
Score 100/100Direktt has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The direktt plugin v1.0 exhibits a mixed security posture. It demonstrates good practices in several areas, notably the complete avoidance of dangerous functions, 100% usage of prepared statements for SQL queries, and a high percentage of properly escaped output. The absence of any recorded vulnerabilities or CVEs is also a positive indicator. However, a significant concern arises from the large attack surface, with 15 AJAX handlers lacking authentication checks. This presents a substantial risk of unauthorized actions being performed if an attacker can trigger these handlers. While no critical or high severity taint flows were identified, the presence of 3 flows with unsanitized paths suggests a potential for vulnerabilities that might not have been fully realized in the analysis or could be triggered under specific conditions. The plugin also includes a notable number of external HTTP requests, which could be a vector for information leakage or supply chain attacks if not handled with care. The lack of vulnerability history, while good, can also mean the plugin has not been extensively tested or subjected to the same scrutiny as more popular plugins, making the absence of past issues less of a guarantee of future security.
In conclusion, the plugin has a solid foundation in secure coding practices concerning database interactions and output handling. The primary weakness lies in the unprotected AJAX endpoints, which represent a significant security gap. While the taint analysis did not flag critical issues, the unsanitized paths warrant caution. The plugin's security relies heavily on the robustness of its internal logic and the absence of undiscovered vulnerabilities, given its clean vulnerability history. For production environments, addressing the unprotected AJAX handlers should be a top priority. The relatively small number of total entry points and the good handling of SQL and output are positive, but the unprotected AJAX points overshadow these strengths.
Key Concerns
- AJAX handlers without auth checks
- Flows with unsanitized paths
- External HTTP requests
Direktt Security Vulnerabilities
Direktt Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Direktt Attack Surface
AJAX Handlers 15
REST API Routes 10
Shortcodes 5
WordPress Hooks 46
Maintenance & Trust
Direktt Maintenance & Trust
Maintenance Signals
Community Trust
Direktt Alternatives
Facebook Chat Plugin – Live Chat Plugin for WordPress
facebook-messenger-customer-chat
The Facebook Chat Plugin makes it easy for your website visitors to chat with you and ask you questions, even if they don't have Messenger.
Progressify – All-in-One Progressive Web App (PWA) on Autopilot
progressify
Turn your site into an app-like PWA with install prompts, offline use, push notifications, and more to boost engagement, repeat visits, and sales.
BeyondCart Connector
beyondcart
Transform your eCommerce to a mobile app instantly and build customers for life! Analyze their behavior and drive repeat sales with targeted push noti …
Prompty Web Push Notifications
prompty-web-push-notifications
Easily integrate the Prompty web push notification service with your WordPress site.
AppiFire for Mobile Apps
appifire-for-mobile-apps
This plugin is developed for AppiFire app users. AppiFire product convert your WordPress website into Android & iOS app.
Direktt Developer Profile
1 plugin · 0 total installs
How We Detect Direktt
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/direktt/css/direktt.css/wp-content/plugins/direktt/js/direktt.js/wp-content/plugins/direktt/js/direktt.jsdirektt/css/direktt.css?ver=direktt/js/direktt.js?ver=