First response Security & Risk Analysis

wordpress.org/plugins/first-response

Provides a "911 calls" post type, allowing fire and ems companies to list calls they are dispatched for.

10 active installs v1.1 PHP + WP 3.0.1+ Updated Aug 18, 2015
911ambulanceambulance-corpsemergency-medical-servicesemsemt
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is First response Safe to Use in 2026?

Generally Safe

Score 85/100

First response has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'first-response' plugin v1.1 exhibits a mixed security posture. On one hand, the static analysis reveals a notably small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all detected SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are positive indicators. However, a significant concern arises from the complete lack of output escaping, as 100% of the 8 detected output instances are not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the WordPress frontend or backend.

The plugin's vulnerability history is clean, with no recorded CVEs. This, combined with the lack of critical taint flows and dangerous functions, suggests a generally stable codebase from a historical perspective. However, the absence of vulnerability history should not be interpreted as a guarantee of future security. The significant flaw in output escaping, coupled with zero nonce and capability checks, indicates a lack of basic security hardening measures that could be exploited.

In conclusion, while 'first-response' v1.1 benefits from a limited attack surface and secure database interactions, the severe deficiency in output escaping is a critical weakness that severely undermines its overall security. The absence of nonce and capability checks further exacerbates this risk. Despite a clean vulnerability history, the identified code issues present a tangible and immediate risk to users.

Key Concerns

  • Unescaped output found
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

First response Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

First response Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

First response Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped8 total outputs
Attack Surface

First response Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitfirst-response.php:63
actionadmin_menufirst-response.php:84
Maintenance & Trust

First response Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 18, 2015
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

First response Developer Profile

Jess Mann

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect First response

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
call
Shortcode Output
<h3>Importing calls since
FAQ

Frequently Asked Questions about First response