Eloquent Chatbot Security & Risk Analysis

wordpress.org/plugins/eloquent-chatbot

Inject an Eloquent AI chatbot into your WordPress site by configuring a Domain Identifier.

0 active installs v1.2.0 PHP 7.4+ WP 6.0+ Updated Feb 5, 2026
aichatboteloquentembedintegration
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Eloquent Chatbot Safe to Use in 2026?

Generally Safe

Score 100/100

Eloquent Chatbot has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'eloquent-chatbot' v1.2.0 plugin exhibits a strong security posture with no identified vulnerabilities in its code or historical records. The plugin demonstrates good security practices, including proper output escaping and using prepared statements for all SQL queries. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its secure design. The presence of a capability check, even with a small attack surface, is a positive sign.

However, a notable absence of nonce checks on AJAX handlers, REST API routes, shortcodes, and cron events, coupled with zero identified entry points, creates an ambiguous situation. While the static analysis reported no unprotected entry points, the lack of specific checks like nonces means that if any entry points were to be introduced or overlooked in future development, they would potentially lack crucial security measures. The plugin's vulnerability history being entirely clear is a positive indicator of diligent development, but the lack of any recorded vulnerabilities in the past does not guarantee future security.

In conclusion, 'eloquent-chatbot' v1.2.0 appears to be a secure plugin in its current state, with no known vulnerabilities or critical code flaws identified. The development team seems to follow secure coding principles. The primary area for potential future improvement would be the implementation of nonce checks on any new entry points that may arise, ensuring a robust defense against a wider range of attacks.

Key Concerns

  • No nonce checks found
Vulnerabilities
None known

Eloquent Chatbot Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Eloquent Chatbot Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Eloquent Chatbot Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Eloquent Chatbot Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menueloquent-chatbot.php:27
actionadmin_initeloquent-chatbot.php:28
actionadmin_initeloquent-chatbot.php:29
actionwp_enqueue_scriptseloquent-chatbot.php:30
filterscript_loader_tageloquent-chatbot.php:31
Maintenance & Trust

Eloquent Chatbot Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 5, 2026
PHP min version7.4
Downloads177

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Eloquent Chatbot Developer Profile

jeromkok

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Eloquent Chatbot

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eloquent-chatbot/eloquent-chatbot.php
Version Parameters
md5(id).*md5(id).*md5(id).*md5(id).*md5(id).*md5(id).*

HTML / DOM Fingerprints

Data Attributes
defer
FAQ

Frequently Asked Questions about Eloquent Chatbot