ECard – Digital Visiting Card Security & Risk Analysis

wordpress.org/plugins/ecard-digital-visiting-card

Create stylish digital business cards as mini websites directly on your site with the ECard plugin. Perfect for professionals and businesses.

300 active installs v1.5.0 PHP 7.0+ WP 4.7+ Updated Sep 17, 2025
business-cardmini-websitemobile-cardpocket-websitevisiting-card
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ECard – Digital Visiting Card Safe to Use in 2026?

Generally Safe

Score 100/100

ECard – Digital Visiting Card has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The "ecard-digital-visiting-card" plugin, version 1.5.0, exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The plugin demonstrates good practices by avoiding direct SQL queries without prepared statements, performing a high percentage of output escaping, and implementing nonce and capability checks on its entry points. Furthermore, the absence of any known vulnerabilities (CVEs) or critical taint analysis findings is a positive indicator. However, a significant concern lies in the presence of the `unserialize` function, which, if used with user-controlled input without strict validation, can lead to arbitrary object deserialization vulnerabilities. While the attack surface is small and all entry points appear to have authentication checks, the potential for deserialization issues warrants careful consideration and review of how `unserialize` is implemented within the plugin. The lack of historical vulnerabilities suggests a history of secure development or minimal exposure, but the static code signals, specifically the use of `unserialize`, represent the primary risk.

Key Concerns

  • Presence of 'unserialize' function
Vulnerabilities
None known

ECard – Digital Visiting Card Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ECard – Digital Visiting Card Code Analysis

Dangerous Functions
4
Raw SQL Queries
0
0 prepared
Unescaped Output
3
178 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$social_links = isset($post_meta['_ecard_social_links'][0]) ? unserialize($post_meta['_ecard_social_includes\ecard-template-variables.php:23
unserialize$services = isset($post_meta['_ecard_services'][0]) ? unserialize($post_meta['_ecard_services'][0]) includes\ecard-template-variables.php:24
unserialize$gallery = isset($post_meta['_ecard_gallery'][0]) ? unserialize($post_meta['_ecard_gallery'][0]) : [includes\ecard-template-variables.php:25
unserialize$videos = isset($post_meta['_ecard_videos'][0]) ? unserialize($post_meta['_ecard_videos'][0]) : [];includes\ecard-template-variables.php:26

Output Escaping

98% escaped181 total outputs
Attack Surface

ECard – Digital Visiting Card Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_ecard_remove_promo_bannerincludes\ecard-promotion.php:338
WordPress Hooks 17
actionecard_add_tab_titlesincludes\ecard-promotion.php:12
actionecard_add_tab_contentsincludes\ecard-promotion.php:34
actionadmin_noticesincludes\ecard-promotion.php:187
actionadmin_headincludes\ecard-promotion.php:269
actionadmin_footerincludes\ecard-promotion.php:322
actionwpincludes\ecard-promotion.php:350
actionecard_read_promo_banner_eventincludes\ecard-promotion.php:357
actioninitincludes\ecard.php:73
actioninitincludes\ecard.php:91
filterajax_query_attachments_argsincludes\ecard.php:102
actionadmin_enqueue_scriptsincludes\ecard.php:167
filtertemplate_includeincludes\ecard.php:247
actionwp_enqueue_scriptsincludes\ecard.php:263
actionwp_enqueue_scriptsincludes\ecard.php:281
actionadd_meta_boxesincludes\metaboxes\ecard-features.php:14
actionsave_postincludes\metaboxes\ecard-features.php:591
actionadmin_noticesincludes\metaboxes\ecard-features.php:605

Scheduled Events 1

ecard_read_promo_banner_event
Maintenance & Trust

ECard – Digital Visiting Card Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 17, 2025
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs300
Developer Profile

ECard – Digital Visiting Card Developer Profile

Ankitkumar Shah

1 plugin · 300 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ECard – Digital Visiting Card

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ecard-digital-visiting-card/assets/css/admin-digital-card.css/wp-content/plugins/ecard-digital-visiting-card/assets/library/font-awesome/css/fontawesome-all.css/wp-content/plugins/ecard-digital-visiting-card/assets/js/admin-digital-card.js
Script Paths
/wp-content/plugins/ecard-digital-visiting-card/assets/js/admin-digital-card.js
Version Parameters
ecard-digital-visiting-card/assets/css/admin-digital-card.css?ver=ecard-digital-visiting-card/assets/js/admin-digital-card.js?ver=ecard-digital-visiting-card/assets/library/font-awesome/css/fontawesome-all.css?ver=6.6.0

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about ECard – Digital Visiting Card